Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 232 Next »

12%
Many approaches help secure a web server
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © alexwhite, 123RF.com
of the web server. However, even if SELinux cannot be enforced, there are effective ways to provide basic protection. Another extensive protection measure is the use of a web application firewall such as mod
12%
Encrypting DNS traffic on Linux with DoT
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Alexander Grey on Unsplash
, the DNS traffic is encrypted directly above the User Datagram Protocol (UDP), without needing another protocol in the application layer, making it easier for DNS providers to support this standard because
12%
Migration from LDAP to FreeIPA
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pier paolo gentili, 123RF
. This is especially useful if the information is no longer needed on the FreeIPA system. Corresponding parameters exist for groups, and ipa help migrate-ds provides an overview of the options. Migrating user
12%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
software. Docker Desktop [1] provides a Docker environment for these systems, with other components in addition to the Docker engine and the command-line client. For example, you also get the container
12%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
(CA) can issue a valid certificate for any domain, provided users or their programs trust the CA. However, CAs do not always check the legitimacy of applicants, so attackers can obtain a valid
12%
Secure email communication
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Simon Moog on Unsplash
that outgoing email reaches the intended recipient reliably. Microsoft in particular and the email service providers they control are considered particularly strict when it comes to accepting messages from third
12%
Load testing with Locust
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Damien TUPINIER on Unsplash
of the test to provide the required information for the users of your service. After the load test, check that the service is available again without errors and reset the TTL value. Preparing Locust Locust
12%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
-Hellman (ECDH) key exchange that provides strong security against classical adversaries. At the same time, the X25519 approach is highly efficient, requiring very short key sizes and computation times
12%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
Security analysts and providers use the term "attack surface management" (ASM) to describe tools and software-as-a-service (SaaS) offerings that are intended to enable enterprises – large corporations
12%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
to provide high availability and high performance. According to the announcement, database administrators can use a graphical console to execute administrative tasks such as backup, restore, node isolation

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice