Articles

Lead Image © r lakhesis, 123RF.com

Lead Image © r lakhesis, 123RF.com

Traffic analysis with mitmproxy

The mitmproxy tool puts interactive traffic analysis in your hands.
Lead Image © sony sivanandan, 123RF.com

Lead Image © sony sivanandan, 123RF.com

Web applications with Julia

The technical programming language Julia is fast becoming a favorite with scientists and engineers of all stripes, but it is also well suited to form the backbone of interactive websites that explain these science and engineering concepts.
Lead Image © tarokichi, 123RF.com

Lead Image © tarokichi, 123RF.com

ASM tools and strategies for threat management

The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.
Lead Image © James Thew, Fotolia.com

Lead Image © James Thew, Fotolia.com

Purdue Model for industrial networking

The Purdue Model maps the challenges of networking industrial systems to five levels, helping to target and mitigate risk and address vulnerabilities. We look at the Purdue Model in detail, investigate an implementation tool, and explain the role of zero trust.
Photo by Nathan Roser on Unsplash

Photo by Nathan Roser on Unsplash

Optimizing domain controller security

Configure your domain controller security settings correctly with Policy Analyzer and current Microsoft baselines for a leak-tight Active Directory.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

Automating deployments on Proxmox with OpenTofu and cloud-init

Use OpenTofu and cloud-init to deploy virtual machines in a Proxmox hypervisor and populate them automatically with services.

Container compliance with dockle

The open source dockle tool can help keep your Docker containers compliant.
Lead Image © Kirill Makarov, 123RF.com

Lead Image © Kirill Makarov, 123RF.com

Comparing system rescue distros

Rescue systems play a particularly important role for desktops because they cannot simply be reinstalled on the fly. We look at venerable but outdated Knoppix and three still in development: Grml, SystemRescue, and Finnix.

SC25 Highlights

The GPU split, AI in HPC, quantum computing, and power and cooling.

Photo by Barnabas Davoti on Unsplash

Photo by Barnabas Davoti on Unsplash

File access optimization discovery and visualization

File I/O is a limiting factor for many applications and can become a bottleneck for data-intensive computing. We analyze different file access functions and present a script that visualizes and optimizes inefficient file I/O.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=