Articles
CrowdSec crowd security service
Threats can be detected and averted at an early stage with crowd security, in which organizations form a community to take concentrated action against cyberattacks by sharing attack data. We explain how this strategy works with the CrowdSec cloud service.
Verifying your configuration
Automated acceptance testing is a powerful tool for catching problems related to misconfiguration. We'll show you how to implement your own acceptance testing environment with a free tool called goss.
The end of SHA-1
The SHA-1 cryptographic hash function has been considered insecure for a long time. Some Linux distributions have banned or no longer use it – with some consequences, though.
Data security and data governance
Protecting data becomes increasingly important as the quantity and value of information grows. We describe the basics of data security and governance and how they intertwine.
Network monitoring with Zeek
Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization.
Analysis tour with Binary Ninja
Binary analysis is an advanced technique used to work through cyberattacks and malware infestations and is also known as reverse engineering. We show you how to statically analyze binary programs with Binary Ninja, an interactive binary analysis platform.
IAM for midmarket companies
We look at the role of identity and access management in midmarket organizations.
When are Kubernetes and containers not a sensible solution?
As the major Linux distributors increasingly lean toward containers, many administrators have come to realize that containers are by no means a panacea for all their problems.
SoftEther VPN software
SoftEther is lean VPN software that outpaces the current king of the hill, OpenVPN, in terms of technology and performance.
Alternative virtualization solutions when OpenStack is too much
OpenStack is considered the industry standard for building private clouds, but the solution is still far too complex and too difficult to maintain and operate for many applications. What causes OpenStack projects to fail, and what alternatives do administrators have?
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.