Articles

Lead Image ©pakhnyushchyy, 123RF.com

Lead Image ©pakhnyushchyy, 123RF.com

Networking strategies for Linux on Azure

We explore advanced networking strategies tailored for Linux workloads on Azure.
Lead Image © Goran Bogicevic, Fotolia.com

Lead Image © Goran Bogicevic, Fotolia.com

Production-ready mini-Kubernetes installations

Kubernetes can be highly complex, with massive setup routines that are totally over the top for newcomers. If you want to try out Kubernetes or run it in production, you have a number of options, even if you decide not to use the comprehensive packages from established vendors.
Lead Image © kritiya, 123RF.com

Lead Image © kritiya, 123RF.com

Automated health checks

The open source Dradis framework helps you create plans for carrying out team pentests and facilitates the task of standardizing reports from different tools to create summary output.
Lead Image © r lakhesis, 123RF.com

Lead Image © r lakhesis, 123RF.com

Traffic analysis with mitmproxy

The mitmproxy tool puts interactive traffic analysis in your hands.
Photo by Nathan Roser on Unsplash

Photo by Nathan Roser on Unsplash

Optimizing domain controller security

Configure your domain controller security settings correctly with Policy Analyzer and current Microsoft baselines for a leak-tight Active Directory.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

Automating deployments on Proxmox with OpenTofu and cloud-init

Use OpenTofu and cloud-init to deploy virtual machines in a Proxmox hypervisor and populate them automatically with services.
Photo by Kier in Sight Archives on Unsplash

Photo by Kier in Sight Archives on Unsplash

Serverless applications with OpenFaaS

Use advanced techniques for automation, optimization, and security to deploy serverless applications with the OpenFaaS framework in a Linux environment.
Photo by Debby Ledet on Unsplash

Photo by Debby Ledet on Unsplash

Anonymization and pseudonymization of data

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.
Lead Image © blas, Fotolia.com

Lead Image © blas, Fotolia.com

Tools for hardware diagnostics under Windows

We look at one Windows on-board tool, five free tools, and a commercial tool to discover hardware installed on a Windows computer and determine whether it is still working properly.
Lead Image © tarokichi, 123RF.com

Lead Image © tarokichi, 123RF.com

ASM tools and strategies for threat management

The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=