Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (140)
  • Article (45)
  • News (4)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 19 Next »

99%
Automating system configuration with Ansible AWX
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Rungaroon taweeapiradeemunkohg, 123RF.com
Demo Inventory . You can simply ignore this and create a new inventory using Add . The Add Inventory form lets you configure settings for the new inventory (Figure 3). The inventory contains all ... 48
99%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue ... 48
99%
Optimization and standardization of PowerShell scripts
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Kheng Ho Toh, 123rf.com
and closing curly brackets is controversial among developers, placing the brackets on a separate line is a good idea (Figure 3). Figure 3: Code clarity ... 48
99%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
of quantum mechanics. [3] [4] Peering inside a D-Wave quantum computer. Thom did shed some light on what kind of problems quantum computers may solve ... 48
99%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
variants: Meltdown-PK on Intel, and Meltdown-BR on Intel and AMD. The rest of the five flaws were related to Spectre. "We evaluate all 7 attacks in proof-of-concept implementations on 3 major processor ... 48
99%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where ... 48
88%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... of machines. Tools such as FAI created for physical machines are of use when deploying virtual machines, as well, as are distro-specific tools (e.g., autoinstall for OpenBSD [2], preseed for Debian [3
62%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
Rubén Llorente ... fails to complete. If the script does not work with your distribution, a manual install will be required [3]. The EasyInstall script has the following prerequisites: Apt or Yum package managers
62%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... is not verified. The purpose of this routine is to prevent man-in-the-middle (MITM) attacks. Sake uses the x/crypto/ssh Go package, which is a bit quirky [3]. An issue I stumbled on when testing Sake
62%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
Rubén Llorente ... iRedMail-related products. The downloadable installer is the product I focus on in this article. The free-tier product, licensed as free open source software under the GPL3, is a set of scripts

« Previous 1 2 3 4 5 6 7 8 ... 19 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice