Articles
Optimizing domain controller security
Configure your domain controller security settings correctly with Policy Analyzer and current Microsoft baselines for a leak-tight Active Directory.
Bridging the Gap: The First Enterprise-Grade Linux Solution for the Cloud-to-Edge Continuum
SPONSORED: As the Linux market is set to soar to nearly USD 100 billion by 2032, businesses are facing mounting challenges in managing increasingly complex workloads spanning from the cloud to the edge. Traditional Linux distributions are not built to meet the specific demands of these modern use cases, creating an urgent need for a more specialized, enterprise-grade solution.
A feature-rich drop-in-replacement for Microsoft Exchange
Grommunio is a completely open source and fully compatible drop-in replacement for Microsoft Exchange that uncouples your company from Microsoft's cloud strategy and its severe security and data protection issues.
An army of Xeon cores to do your bidding
Explore low-cost parallel computing.
Detecting system compromise
Runtime Integrity services provide assurance that a system is uncorrupted, offering increased confidence in core security services and the potential for enhanced security decisions across many use cases through the incorporation of integrity information in their inputs.
Build and host Docker images
When facing the challenge of packaging your application in a container, take into account your needs in terms of handling and security and investigate sensible options for hosting your own registry.
Fast email server deployments with iRedMail
Setting up and maintaining an email service in the data center doesn't have to be a nightmare. The iRedMail open source solution lets you deploy a full-featured email server on a number of platforms in a matter of minutes.
Border Gateway Protocol
We look at the Border Gateway Protocol, how it routes packets through the Internet, its weaknesses, and some hardening strategies.
Building a defense against DDoS attacks
Targeted attacks such as distributed denial of service, with thousands of computers attacking your servers until one of them caves in, cannot be prevented, but they can be effectively mitigated.
Recovering from a cyberattack in a hybrid environment
Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
