Articles

Lead Image © shutter999, 123RF.com

Lead Image © shutter999, 123RF.com

Hardening SSH authentication to the max

Public key authentication further supplemented with one-time password or hardware authentication methods improves SSH security while offering genuine convenience.
Lead Image © Goran Bogicevic, Fotolia.com

Lead Image © Goran Bogicevic, Fotolia.com

Production-ready mini-Kubernetes installations

Kubernetes can be highly complex, with massive setup routines that are totally over the top for newcomers. If you want to try out Kubernetes or run it in production, you have a number of options, even if you decide not to use the comprehensive packages from established vendors.
Lead Image ©pakhnyushchyy, 123RF.com

Lead Image ©pakhnyushchyy, 123RF.com

Networking strategies for Linux on Azure

We explore advanced networking strategies tailored for Linux workloads on Azure.
Photo by Debby Ledet on Unsplash

Photo by Debby Ledet on Unsplash

Anonymization and pseudonymization of data

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.
Photo by Kier in Sight Archives on Unsplash

Photo by Kier in Sight Archives on Unsplash

Serverless applications with OpenFaaS

Use advanced techniques for automation, optimization, and security to deploy serverless applications with the OpenFaaS framework in a Linux environment.
Photo by Toby Elliott on Unsplash

Photo by Toby Elliott on Unsplash

Application-aware batch scheduler

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.
Lead Image © Darko Novakovic, fotolia.com

Lead Image © Darko Novakovic, fotolia.com

Self-hosted Pritunl VPN server with MFA

We give you the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.
Photo by Oli Zubenko on Unsplash

Photo by Oli Zubenko on Unsplash

Simplify your migration from Docker to Podman

Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use Podman Desktop to do so.
Lead Image © r lakhesis, 123RF.com

Lead Image © r lakhesis, 123RF.com

Traffic analysis with mitmproxy

The mitmproxy tool puts interactive traffic analysis in your hands.
Lead Image © sony sivanandan, 123RF.com

Lead Image © sony sivanandan, 123RF.com

Web applications with Julia

The technical programming language Julia is fast becoming a favorite with scientists and engineers of all stripes, but it is also well suited to form the backbone of interactive websites that explain these science and engineering concepts.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=