Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 133 Next »

15%
Prowling AWS
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Dmitry Naumov, 123RF.com
accounts over which you want to run Prowler, you can interpolate the name of the account profile in your ~/.aws/credentials file: $ ./prowler -p custom-profile -r eu-west-1 Although the command only points
15%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
if names pointed to different addresses on the local network, compared with externally. On the other hand, domain names that only the internal DNS server knows are no problem. With the default settings you
15%
Windows Admin Center for managing servers and clients
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Dietmar Hoepfl, 123RF.com
that are already installed in the State column. Click on a server role to install (or uninstall) it. Individual role services can also be installed or uninstalled at this point. Working with Tags and Finding
15%
Policy-based DNS in Windows Server 2016
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © mikiel, 123RF.com
of the zone transfer. The default scope is always transferred, provided the zone transfer is generally permitted by the policies. Limited Manageability At this point, the DNS policies can be managed
15%
NAS with Btrfs-based Rockstor
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Lane Smith on Unsplash
expand Unknown . Use plus and minus buttons to add new partitions or delete existing ones. Once you have added a mount point to a partition, it will appear at top left in the list below New Rockstor 3
15%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
. In the rest of this article, I go through the individual playbooks, explain their meaning, and point out places where you have to adjust your local configuration. Configuring the Inventory Before working
15%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
, a useful HTML summary page points out where issues have been spotted. A Wreck of Seabirds Of course, you shouldn't take risks with your potentially complex AWS configuration, so getting the IAM rules
15%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
to USB sticks, as could netcat over the network. Newer distributions, however, limit read permissions considerably, which is a good idea from a security point of view. Linux Memory Grabber [9] can help you
15%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
discovery. 3. Network. With networking configured on an instance, this stage runs the disk_setup and mounts modules and configures mount points. 4. Config. This stage runs modules included in the cloud
15%
Modularize websites with Web Components
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Prokhorov, fotolia.com
the stringify() method to deserialize the parse() method of the global JSON object (line 9). At this point, the listItem() method reads the serialized field with getItem() from localStorage and converts

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice