-
+36 +5
Shim vulnerability exposes most Linux systems to attack
This low-level software is the glue that enables Linux to run on Secure Boot PCs, and it has a nasty problem.
-
+28 +1
OpenTofu 1.7 General Availability: Open Source Infrastructure-as-Code
Moving forward, the plan is for OpenTofu to maintain compatibility with Terraform while introducing significant new features.
-
+62 +5
Linux Server Operating Systems: Red Hat Enterprise Linux and Beyond
Besides Red Hat Enterprise Linux, several RHEL rival clones and offshoots are vying for your Linux server and cloud dollar. Here's what's with them.
-
+45 +4
Tuning the Linux kernel with AI, according to ByteDance
Linux works well for most jobs, but to get it to work great requires kernel tuning, and that's never easy. ByteDance has a proposal to make this easier.
-
+21 +5
How to Choose a Microservices Monitoring Tool
Microservices allow developers to break down their applications into smaller, loosely coupled services that can be developed, deployed, and scaled independently. But you need a monitoring tool to track whether they work correctly – which means you need useful criteria for choosing one.
-
+38 +6
CIQ spins out its own Red Hat Ansible interface take: Ascender
CIQ, Rocky Linux's founding support and services partner, has customized its own take, Ascender on the Ansible AWX front end to the popular DevOps program Ansible.
-
+25 +2
Canonical Unveils Landscape 23.03: Streamlining Ubuntu Linux Management
Canonical's Landscape sysadmin tool for Ubuntu and Debian Linux keeps getting better and better.
-
+12 +3
Free SPF/DKIM/DMARC analyzer tools for DMARC setup
DMARCLY - SPF/DKIM/DMARC tools
-
+15 +1
Network Tools: Check your mailserver online
DNS and Network troubleshooting and diagnostic tools integrated into one sweet interface. A very useful set of tools.
-
+20 +7
The death of the command line
Don't get me wrong: The command line will always be important to sysadmins. But in many ways, it's being superseded by DevOps tools such as Ansible, Chef, and Puppet.
-
+7 +1
Comparing four sites that help you find out if a website is down
What happens when you can’t reach a website you rely on? These online resources help you find out if a site you are trying to browse is down.
-
+4 +1
What’s the difference between containers and virtual machines?
No, containers are not small virtual machines. So, what are they? Well, let me tell you.
-
+21 +1
Linux fundamentals: Essential commands for server administration
Is that service still running? What application is using that TCP port? These questions and more can be answered easily by sysadmins who know simple Linux commands. @Enterprisenxt
-
+13 +3
Here’s why you should use containers
Who doesn't want to save money, development, and deployment time?
-
+6 +2
Top 21 conferences for DevOps and sysadmins in 2018
Learn which DevOps events are must-attend and which might be worth considering.
-
+14 +7
Sysadmin survival guide
It's hard to predict how different sysadmins jobs will be in the coming years. But here are some guidelines gathered during a sysadmin career spanning more than three decades.
-
+1 +1
Containerization: The new deployment model for IT Ops
IT Ops teams that create a new deployment model based on containers can point the way to new efficiencies.
-
+11 +5
How migrating to the cloud kept one IT director sane and successful
Rob Hiltbrand, director of IT at The Liberty Group, shared valuable lessons he learned during his company's transition to cloud services. Simply put: Things didn't always go as planned.
-
+2 +1
Best Practices for 2-Factor Authentication and Password Creation on Linux
As we mentioned in the previous article, web browsers present the largest and the most exposed attack surface on your Linux workstation.
-
+11 +4
The IT worker bucket list
What are tech workers' heart's desires? Consider how many of them you could implement in your shop, and make the staff's dreams come true.
Submit a link
Start a discussion