Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (370)
  • Article (117)
  • News (5)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 50 Next »

68%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where ... 48
68%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 info ruby # Needs to be v2.2+ $ curl -sSL https://rvm.io/mpapis.asc | gpg --import - # From here see https://tecadmin.net/install-ruby-latest-stable-centos $ curl -L get.rvm.io | bash -s stable $ source ... 48
55%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
#1 SMP PREEMPT Wed Sep 4 19:55:23 PDT \ 2013 armv7l GNU/Linux 04 shell@android:/ $ cat /proc/version 05 Linux version 3.1.10-gd08812a (build03@cyanogenmod) (gcc version \ 4.6.x-google 20120106 ... 22
55%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
report [3] said weak passwords contributed to 31% of compromises investigated. Without picking on any one organization, choose a company, a social network, and a cloud provider; now, look up ... 22
40%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
of 12. Figure 5: For 100Mb lines between all ports, the value of 19 applies to all route costs, except for the bundled cables between Switches 3 and 4 ... 22
40%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
for use as a backup or rescue system. Redo Backup is immediately ready for use after burning the 250MB image file to CD. To back up virtual machines, you can also integrate it directly as a virtual CD ... 22
40%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © 36clicks, 123RF.com
these base images "boxes." Prebuilt boxes can be downloaded free of charge via the community collection on Vagrantbox.es [3] (Figure 1) or from the Vagrant Cloud powered by HashiCorp [4]. The latter provides ... 22
39%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
group, an initial test shows whether or not access works: # virsh -c qemu+ssh://virtuser@ernie/system version Compiled against library: libvirt 1.1.3 Using library: libvirt 1.1.3 Using API: QEMU 1.1.3 ... 22
39%
Save and Restore Linux Processes with CRIU
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Valentin Volkov, 123RF.com
.1-rc2 and v1.1 followed soon after. Two more versions followed quickly, and when this article went to press, v1.3-rc2 was the most recent release. The following comments are based on the v1.1 release ... 22
39%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
and production. To show how monitoring profiles can be implemented for a specific server, the example distinguishes between mail, web, and database servers. It assumes that the stable version 1.12.3 of OpenNMS [6 ... 22

« Previous 1 2 3 4 5 6 7 8 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice