Articles

Photo by Marten Newhall on Unsplash

Photo by Marten Newhall on Unsplash

Remote Access with Tactical RMM

The Tactical RMM open source tool offers a combination of remote monitoring and management, with agents to support Linux, macOS, and Windows.
Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Processing the new sudo logging format

We present an example that shows how syslog-ng uses the new logging format of the sudo tool to process sudo messages.
Lead Image © berkay08, 123RF.com

Lead Image © berkay08, 123RF.com

Passwords, passphrases, and passkeys

Many rules for secure passwords pose major obstacles for unsuspecting users. We investigate how meaningful rigid guidelines are, restate how important passphrases and passkeys are becoming, and offer two recommendations for team-capable password management.
Photo by Toby Elliott on Unsplash

Photo by Toby Elliott on Unsplash

Application-aware batch scheduler

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.
Photo by The New York Public Library on Unsplash

Photo by The New York Public Library on Unsplash

Centrally manage configuration files

The GNU Stow tool in combination with Ansible can help you manage configuration files.
Lead Image © Darko Novakovic, fotolia.com

Lead Image © Darko Novakovic, fotolia.com

Self-hosted Pritunl VPN server with MFA

We give you the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.
Photo by Debby Ledet on Unsplash

Photo by Debby Ledet on Unsplash

Anonymization and pseudonymization of data

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.
Photo by Oli Zubenko on Unsplash

Photo by Oli Zubenko on Unsplash

Simplify your migration from Docker to Podman

Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use Podman Desktop to do so.
Lead Image © Andrea De Martin, 123RF.com

Lead Image © Andrea De Martin, 123RF.com

Identify malicious traffic with Maltrail

This traffic analysis software identifies malicious traffic on your network with the use of established sources.
Photo by Samantha Sophia on Unsplash

Photo by Samantha Sophia on Unsplash

Designing a Secure Active Directory

Many experienced administrators find that Active Directory is particularly problematic in terms of security. We reflect on the secure design, rigorous hardening, and security-conscious management of this service.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=