Articles
Processing the new sudo logging format
We present an example that shows how syslog-ng uses the new logging format of the sudo tool to process sudo messages.
Designing a Secure Active Directory
Many experienced administrators find that Active Directory is particularly problematic in terms of security. We reflect on the secure design, rigorous hardening, and security-conscious management of this service.
Operating system images with bootc
The bootc project lets you use a container-based workflow to create bootable operating system images. In a few simple steps, we show you how to use Podman to create ready-to-run images.
Traffic analysis with mitmproxy
The mitmproxy tool puts interactive traffic analysis in your hands.
Web applications with Julia
The technical programming language Julia is fast becoming a favorite with scientists and engineers of all stripes, but it is also well suited to form the backbone of interactive websites that explain these science and engineering concepts.
ASM tools and strategies for threat management
The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.
Purdue Model for industrial networking
The Purdue Model maps the challenges of networking industrial systems to five levels, helping to target and mitigate risk and address vulnerabilities. We look at the Purdue Model in detail, investigate an implementation tool, and explain the role of zero trust.
Optimizing domain controller security
Configure your domain controller security settings correctly with Policy Analyzer and current Microsoft baselines for a leak-tight Active Directory.
Automating deployments on Proxmox with OpenTofu and cloud-init
Use OpenTofu and cloud-init to deploy virtual machines in a Proxmox hypervisor and populate them automatically with services.
Identifying and using software licenses
Software licenses tell you how you can use software packages and legally deploy the software in your projects. Fortunately, tools help you automate the process of verifying licenses.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.










