Articles

Photo by CHUTTERSNAP on Unsplash

Photo by CHUTTERSNAP on Unsplash

JMeter tests loads and measures performance of static and dynamic resources

The JMeter specialized integrated development environment applies test scripts for load testing and performance evaluation and supports various protocols that come in handy for Internet-powered applications.
Photo by Andrea Davis on Unsplash

Photo by Andrea Davis on Unsplash

Nested Kubernetes with Loft

Kubernetes has limited support for multitenancy, so many admins prefer to build multiple standalone Kubernetes clusters that eat up resources and complicate management. As a solution, Loft launches any number of clusters within the same control plane.
Photo by Muneeb Syed on Unsplash

Photo by Muneeb Syed on Unsplash

Use Linux Containers with WSL2 on Windows

Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2.
Lead Image © Victor Zastolskiy, 123RF.com

Lead Image © Victor Zastolskiy, 123RF.com

Run applications in a containerized sandbox with Firejail

Isolate popular applications in flexible, easy-to-set-up, and easy-to-take-down containers with Firejail.
Lead Image © bluebay, 123rf.com

Lead Image © bluebay, 123rf.com

Hunt down vulnerabilities with the Metasploit pen-testing tool

The veteran Metasploit is by no means obsolete and is still used as a typical workflow to find and analyze security vulnerabilities in Windows 10 and Linux systems.
Lead Image © Olivier Le Moal, 123RF.com

Lead Image © Olivier Le Moal, 123RF.com

Secure SSH connections the right way

Admins use SSH, the proverbial Swiss army knife of system management, for many of their daily tasks, but no matter how powerful the tool might be, it typically does not offer adequate protection. We look at ways to tighten SSH security.
Photo by Clay LeConey on Unsplash

Photo by Clay LeConey on Unsplash

Getting started with Prometheus

Prometheus is a centralized time series database with metrics, scraping, and alerting logic built in. We help you get started monitoring with Prometheus.
Lead Image © Kurhan, 123RF.com

Lead Image © Kurhan, 123RF.com

Incident Analysis with The Hive and Cortex

Deployed together, The Hive platform and Cortex automation tool optimize the workflow for your incident response team.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Data Compression as a CPU Benchmark

Data compression is a more realistic compute benchmark than number crunching.
Photo by Lucas Gallone on Unsplash

Photo by Lucas Gallone on Unsplash

Three full-text desktop search engines

Desktop search engines such as Tracker, DocFetcher, and Recoll help track down files by their content, even in massive datasets.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=