Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 67 Next »

41%
Management improvements, memory scaling, and EOL for FileStore
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Yannic Läderach on Unsplash
immediate action. In this article, I explain why this is the case and what else you can and should expect from Ceph 17.2. Figure 1: FileStore is the name ... Ceph 17.2
39%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
. Listing 1 A SIP Request 01 INVITE sip:bob@tuwien.ac.at SIP/2.0 02 Via: SIP/2.0/UDP myhost.myprovider.de;branch=z9hG4bK776asdhds 03 ... 04 To: Bob 05 ... 06 From: Alice Internet Telephony (SPIT) is regarded as the next generation of spam. In this article, we investigate SPIT and point out countermeasures for admins with VoIP servers. ... 0 ... Spam over Internet Telephony
36%
Secure authentication with FIDO2
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lassedesignen, 123RF.com
application with FIDO2, I will refer to the sample application as a guide and look for the important components in the examples for an abstract service of your own. As a concrete use case, I will be looking ... The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service. ... Secure Login with FIDO2 ... Secure authentication with FIDO2
35%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
to me (Listing 2). Listing 2 Action Settings 01 # ban the IP & send an e-mail with whois report and include relevant log lines to the destemail 02 action_mwl = %(banaction)s[name=%(__name__)s ... For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight. ... fail2ban ... The fail2ban intrusion prevention framework
35%
What's new in Ansible 2.0
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Viktor Gladkov, 123RF.com
/blog/2013/12/08/the-origins-of-ansible Ansible: http://www.ansible.com Announcement: http://www.ansible.com/blog/ansible-2.0-launch Installation guide: http://docs.ansible.com ... Ansible 2.0 ... What's new in Ansible 2.0
35%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
distributions support WSL1 and WSL2 differently in some cases. Each distribution can be upgraded or downgraded at any time. WSL1 and WSL2 distributions also can be run side by side. However, to run Docker ... Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2. ... Containers + WSL2 ... Use Linux Containers with WSL2 on Windows
34%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
, the command would be: $ curl -sfL https://get.k3s.io | sh -s - server --datastore-endpoint="mysql://rancher:secret@tcp(10.42.0.1:3306)/rancher" This command only works if the system has access to the Internet ... Rancher 2.5
34%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
The Internet of Things is predicted to be a huge market in the next 10 years, taking the dumb objects around us and making them data-noisy. ... easy to gauge the scale intuitively. The fact is that lots of Internet of Things (IoT) use cases are still hypothetical or just commercially unproven. Your car could talk to the city parking space ... The Internet of Things is predicted to be a huge market in the next 10 years, taking the dumb objects around us and making them data-noisy. ... A Management Platform for the Internet of Things ... The Age of The Internet of Things is upon Us
32%
Secure passwordless logins with FIDO2 and LDAP
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
specifically use when selecting the private key: attributetype ( 1.3.6.1.4.1.56227.1.1.2 NAME 'fido2credentialId' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE ) This identifier ... Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication. ... Store FIDO2 info in LDAP ... Secure passwordless logins with FIDO2 and LDAP
30%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
transmission of digital signals, whose function is completely definable in software. One pin each maps the values 0 and 1 in the simplest case – for example, to switch on an LED (output) or to query the position ... Microsoft Azure Sphere links three vital elements of the Internet of Things – microcontrollers, software, and cloud service – with a focus on security. ... Azure Sphere for Internet of Things

« Previous 1 2 3 4 5 6 7 8 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice