Articles
iSCSI: Set up and use LIO targets
The LIO multiple-protocol SCSI target is perfectly suited for complex test environments, especially because of its support for SCSI standards across the board.
Look for file changes and kick off actions with Watchman
Watchman watches files and directories for changes and triggers actions when specific changes are noted.
Comparing Logon Script Alternatives
We compare the performance of batch, VBScript, and PowerShell commands with four standard tasks.
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
Encryption and server locations in Germany and Switzerland are sought-after attributes in the search for a more secure and reliable email service. We compare four providers who promise to protect your privacy.
Integrating FreeNAS with Windows Active Directory
FreeNAS offers a powerful array of features and is adaptable to a wide range of network-attached storage solutions. We look at integrating Windows Active Directory, taking snapshots, replicating, and backing up.
A TurnKey Linux software evaluation platform
TurnKey Linux comes with more than 100 of the most important free enterprise solutions to create a test environment for evaluating new open source system or business software on a local system, on a virtual machine, or in the cloud.
Security in the network with Kali Linux
Thanks to its huge choice of security tools, Linux is perfectly suited to securing heterogeneous networks. With a specialized distro like Kali Linux, you can quickly locate and eliminate security vulnerabilities.
Detecting intruders with Suricata
If you're looking for an intrusion detection and prevention system, it pays to shop around. Suricata offers scalable performance and an impressive set of features – it even supports Snort rulesets.
Tested – Tenable Nessus v6
To ensure your servers and workstations are well protected against attacks on your network, you need a professional security scanner. In version 6, Tenable has substantially expanded its Nessus vulnerability scanner. We pointed the software at a number of test computers.
Moving Data Between Virtual Machines
Network information in virtualized computer landscapes is not easy to access. In this article, we look at a few approaches you can use.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
