Articles

Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Processing the new sudo logging format

We present an example that shows how syslog-ng uses the new logging format of the sudo tool to process sudo messages.
Lead Image © berkay08, 123RF.com

Lead Image © berkay08, 123RF.com

Passwords, passphrases, and passkeys

Many rules for secure passwords pose major obstacles for unsuspecting users. We investigate how meaningful rigid guidelines are, restate how important passphrases and passkeys are becoming, and offer two recommendations for team-capable password management.
Photo by Toby Elliott on Unsplash

Photo by Toby Elliott on Unsplash

Application-aware batch scheduler

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.
Photo by The New York Public Library on Unsplash

Photo by The New York Public Library on Unsplash

Centrally manage configuration files

The GNU Stow tool in combination with Ansible can help you manage configuration files.
Lead Image © Darko Novakovic, fotolia.com

Lead Image © Darko Novakovic, fotolia.com

Self-hosted Pritunl VPN server with MFA

We give you the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.
Photo by Debby Ledet on Unsplash

Photo by Debby Ledet on Unsplash

Anonymization and pseudonymization of data

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.
Photo by Oli Zubenko on Unsplash

Photo by Oli Zubenko on Unsplash

Simplify your migration from Docker to Podman

Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use Podman Desktop to do so.
Lead Image © Andrea De Martin, 123RF.com

Lead Image © Andrea De Martin, 123RF.com

Identify malicious traffic with Maltrail

This traffic analysis software identifies malicious traffic on your network with the use of established sources.
Photo by Samantha Sophia on Unsplash

Photo by Samantha Sophia on Unsplash

Designing a Secure Active Directory

Many experienced administrators find that Active Directory is particularly problematic in terms of security. We reflect on the secure design, rigorous hardening, and security-conscious management of this service.
Lead Image © alfazetchronicles, 123RF.com

Lead Image © alfazetchronicles, 123RF.com

Operating system images with bootc

The bootc project lets you use a container-based workflow to create bootable operating system images. In a few simple steps, we show you how to use Podman to create ready-to-run images.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=