Articles

Photo by Ray Aucott on Unsplash

Photo by Ray Aucott on Unsplash

OCI containers with Podman

The Podman alternative to Docker is a daemonless container engine with a run time that executes on request in root or user mode.
Lead Image © higyou, 123RF.com

Lead Image © higyou, 123RF.com

Internet socket programming in Perl

Perl sockets work like file handles that can span across a network or the entire Internet.
Lead Image © Galyna Andrushko, 123RF

Lead Image © Galyna Andrushko, 123RF

Credential harvesting at the network interstice

To thwart credential harvesters at the network interstice, you must understand how attackers exploit browser transactions.
Photo by Jani Brumat on Unsplash

Photo by Jani Brumat on Unsplash

Enlarging the TCP initial window

Linux on-board resources let admins open the floodgates for high-volume TCP packages.
Lead Image © Orlando Rosu, 123rf.com

Lead Image © Orlando Rosu, 123rf.com

Manage OpenVPN keys with Easy-RSA

The Easy-RSA tool that comes with OpenVPN provides trouble-free open source PKI management.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

Google Cloud Storage for backups

We compare Google Cloud Storage for Internet-based backups with Amazon S3.
Lead Image © Artem Egorov, 123RF.com

Lead Image © Artem Egorov, 123RF.com

The new OpenShift version 4

Red Hat launched the brand new OpenShift 4 with a number of changes that might suggest upgrading or even getting your feet wet if you've stayed out of the pool so far.
Lead Image © Andrey KOTKO, 123RF.com

Lead Image © Andrey KOTKO, 123RF.com

Static code analysis finds avoidable errors

Static code analysis tools like JSLint, Splint, RATS, and Coverity help you find code vulnerabilities.

Protect Azure resources with Network Security Groups

Security segmentation into zones has long been the norm in data centers. Microsoft Azure Network Security Groups offers this kind of granular defense-in-depth security, including multilevel configuration of access rules.
Lead Image © yemelyanov, 123RF.com

Lead Image © yemelyanov, 123RF.com

Call web pages in the terminal with Browsh

The Browsh command-line browser displays web pages with text characters and thus supports true-to-layout browsing at the command line.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=