Articles

Lead Image © Wavebreak Media Ltd, 123RF.com

Lead Image © Wavebreak Media Ltd, 123RF.com

Automation with Ansible

Ansible offers automatic provisioning and configuration capabilities similar to that of Chef and Puppet, but it's aimed more at admins than developers.
Lead Image © Barna Tanko, 123RF.com

Lead Image © Barna Tanko, 123RF.com

Handy Windows tools for sniffing network traffic

You don't need expensive software to study the traffic on your network. We look at some handy sniffers for Windows environments, including SmartSniff, SniffPass, Open Visual Traceroute, and Microsoft Message Analyzer.
Lead Image © Oleksiy Mark, 123RF.com

Lead Image © Oleksiy Mark, 123RF.com

Application virtualization with Docker

Half-lives of products are becoming shorter and shorter on today's virtualization market. This year, the buzz is all about Docker.
Lead Image © Zarko Cvijovic, 123RF.com

Lead Image © Zarko Cvijovic, 123RF.com

Innovations in PowerShell 5

Windows 10 brings an updated, fifth release of PowerShell that vastly simplifies the task of managing modules and software packages. The scripting language now also handles various formatted output from commands and selection lists.
Lead Image © Sergei Tryapitsyn, 123RF.com

Lead Image © Sergei Tryapitsyn, 123RF.com

Apache Storm

We take you through the installation of a Storm cluster and discuss how to create your own topologies.
Lead Image © Ulrich M ller, 123RF.com

Lead Image © Ulrich M ller, 123RF.com

Magnum: Exploring OpenStack's Container API

The Magnum project brings Docker container technology to the OpenStack cloud.
Lead Image © silvae, 123RF.com

Lead Image © silvae, 123RF.com

Working with the Exchange Management Shell

We take a close look at the Exchange Management Shell – an essential tool for Exchange administrators.
Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Set up and operate security monitoring throughout the enterprise

We describe some basic considerations for choosing a Security Information and Event Management system and designing its implementation.
Lead Image © konstantynov, 123RF.com

Lead Image © konstantynov, 123RF.com

Successful protocol analysis in modern network structures

Virtual networks and server structures require additional mechanisms to ensure visibility of data streams. We show how to monitor and analyze network functions, even when virtualization is involved.
Lead Image © Andrii IURLOV, 123RF.com

Lead Image © Andrii IURLOV, 123RF.com

Advanced Windows security using EMET

Although attacks on computers are numerous and varied, they are predominantly based on the same techniques. Microsoft closes these vulnerabilities on Windows computers using the Enhanced Mitigation Experience Toolkit (EMET).
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=