Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (19)
  • News (4)
  • Article (1)
Keywords

« Previous 1 2 3 Next »

35%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
the open source nature of the project. Installation and operation are easy to explain: Use the package manager to install the software, load the signatures, and scan the hard drive. These steps
35%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
, but it is precisely this widespread use that makes Entra ID an attractive target for attackers. The reason is clear: An attacker gaining access to identity management can potentially open the door to a wide range
35%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
GNU Privacy Guard (GnuPG) [1] is an open source tool used worldwide for encrypting and signing mail and files. Its implementation and use can be challenging when it comes to distributing
35%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
of their communication, without a need to adapt the application. Falco differs from other monitoring and alerting solutions then, such as those offered by the OpenTelemetry project [14]. Where other solutions require
35%
Full-spectrum security scanner
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Jakob Boman on Unsplash
Trivy is an open source, all-in-one security scanner by Aqua Security that has rapidly become a go-to tool in the DevSecOps toolkit [1]. It earned this reputation by combining multiple security
35%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
the stack in one place: Open Cluster Framework (OCF)-standard resource agents are used to manage the virtual machines from Reactor [7]. Keeping Things Simple Linbit can rightly be accused of having
34%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
Ra Basics Station open source software package must be running on the gateways. Figure 3: With AWS IoT Core, LoRaWAN gateways can connect directly to the cloud
34%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
. Typically, the runtime is based on the duration of a typical user session, but tends to be longer or is automatically extended with each use so as not to disturb users. The Open Worldwide Application
34%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
in reverse often produces less optimal code, but might open code to other approaches. Loop perforation Stochastic non-execution of some loop cycles. Suitable for some algorithms (e.g., neural
34%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
appear to need updates, as supported by open issues on GitHub. However, it still produces useful output. gpufetch The author of cpufetch  also wrote gpufetch . As you can imagine, it’s designed

« Previous 1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice