Articles

Photo by Alexander Redl on Unsplash

Photo by Alexander Redl on Unsplash

Persistent volumes for Docker containers

Equip containers with persistent storage using Docker's plugin system.
Lead Image © Natalia Lukiyanova, 123RF.com

Lead Image © Natalia Lukiyanova, 123RF.com

Open source intelligence tools for pen testing

Automating the pen test discovery process in the era of IoT, the cloud, and social media.
Lead Image © pat138241, 123RF.com

Lead Image © pat138241, 123RF.com

Supporting WebRTC in the enterprise

WebRTC has the potential to bring high-quality, easily developed, and interoperable real-time voice, video, and data communication to all manner of applications in web browsers.
Lead Image © alexutemov, 123RF.com

Lead Image © alexutemov, 123RF.com

Continuous integration with Docker and GitLab

GitLab provides the perfect environment for generating Docker containers that can help you operate critical infrastructure reliably and reproducibly.
Lead Image Photo by Harli Marten on Unsplash

Lead Image Photo by Harli Marten on Unsplash

Platform independence with PowerShell Core

Microsoft has broken new ground with the release of PowerShell Core 6.0, which at heart is a complete reboot in terms of architecture and objectives. For the first time, a new version is not linked to the Windows operating system.
Lead Image © Photo by mathyas kurmann Unsplash.com

Lead Image © Photo by mathyas kurmann Unsplash.com

Setting up and managing IPv6 on Windows Server 2016

Windows Server 2016 automatically prefers IPv6 addresses, if available, but the manual configuration steps differ from IPv4 and necessitate new tools. Here's how to approach IPv6 in your daily admin work.
Photo by Quino Al on Unsplash

Photo by Quino Al on Unsplash

Flatpak, Snap, and AppImage

The Flatpak, Snap, and AppImage package formats work across distributions, but each has its specific disadvantages.
Lead Image © Rostislav Zatonskiy, 123RF.com

Lead Image © Rostislav Zatonskiy, 123RF.com

Malware analysis in the sandbox

In malware analysis, a sandbox can provide insight into the software and its run-time environment. While a sandbox can prevent the execution of malicious code with built-in detection mechanisms, malware developers can use countermeasures to take advantage of those same detection mechanisms.
Photo by rawpixel on Unsplash

Photo by rawpixel on Unsplash

Protecting Samba file servers in heterogeneous environments

Because Samba can be integrated easily into heterogeneous environments, a kind of heterogeneous administration is often necessary, and security falls by the wayside. We show you how to use a Samba file server securely in heterogeneous environments.
Lead Image © Fet, Fotolia.com

Lead Image © Fet, Fotolia.com

What's new in SQL Server 2017

Microsoft SQL Server 2017 introduces SQL Server on Linux, along with machine learning services, support for graph data, and on-premises Power BI.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=