Articles
Hardening SSH authentication to the max
Public key authentication further supplemented with one-time password or hardware authentication methods improves SSH security while offering genuine convenience.
Production-ready mini-Kubernetes installations
Kubernetes can be highly complex, with massive setup routines that are totally over the top for newcomers. If you want to try out Kubernetes or run it in production, you have a number of options, even if you decide not to use the comprehensive packages from established vendors.
Networking strategies for Linux on Azure
We explore advanced networking strategies tailored for Linux workloads on Azure.
Manage and automate networks
The StackStorm open source platform helps admins manage networks efficiently by automating repetitive tasks and responding to events in real time.
Operating large language models in-house
An internal AI server is an interesting way to retain data sovereignty. We show you how to set up an in-house AI server on your hardware and use it in parallel with AI services such as ChatGPT in the cloud.
Snapshot management for Azure VMs
Microsoft recommends the use of snapshots both locally and for Azure VMs. We describe how to create snapshots in the Azure GUI and with PowerShell and how to protect your snapshots against unauthorized access.
Intelligent observability with AI and Coroot
In the deep waters of scalable environments, observability is more important than ever. Coroot enters the scene with eBPF to intercept traffic and collect data that is of interest for monitoring and attack detection.
Develop a simple scanning application with the NAPS2 SDK
A NAPS2 PDF scanner, the C# language, and the .NET Framework set the stage for a CLI app for scanning documents.
Comparing system rescue distros
Rescue systems play a particularly important role for desktops because they cannot simply be reinstalled on the fly. We look at venerable but outdated Knoppix and three still in development: Grml, SystemRescue, and Finnix.
File access optimization discovery and visualization
File I/O is a limiting factor for many applications and can become a bottleneck for data-intensive computing. We analyze different file access functions and present a script that visualizes and optimizes inefficient file I/O.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.










