Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (940)
  • Article (262)
  • News (42)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 Next »

19%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where
19%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
will be based on state-of-art authentication with Active Directory Authentication Library (ADAL) and OAuth 2.0 [3]. Getting Started with Exchange Web Services Since Exchange 2007, Microsoft has recommended
19%
Security issues when dealing with Docker images
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Kae Horng Mau, 123RF.com
, and the registry is usually TLS encrypted and protected by SSL certificates without requiring too much work from the user. The Docker Notary [3] project offers an approach for verifying end-to-end whether an image
19%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
, this service is available through dealers and is called Certified Pre-Owned [3], and in the UK, Approved Used [4]. The basis of the application infrastructure for Porsche Informatik's solutions and services
19%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
over appropriate sharing platforms or simply for direct download. Exchanging Information with MISP The MISP Threat Sharing Platform [3] is currently the tool of choice for processing threat
19%
SQL Server 2022 and Azure
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
in the big data field. SQL Server 2022 at the local data center is the ideal component for making local data available in the cloud. The various functions are illustrated in a YouTube video [3]. One advantage
19%
IAM for midmarket companies
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Robert Anasch on Unsplash
and authentication make the most sense (e.g., Okta [3] and Auth0 [4]). The use of PAM in SMEs is also important, although nowhere near as widespread. However, some of today's IAM offerings offer integrated PAM
19%
Microsoft 365 and Teams settings and security
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Amol Tyagi on Unsplash
users are allowed to synchronize and share data from OneDrive, and you can also configure sharing. Microsoft also provides group policy extensions [3], which can be used to control OneDrive for Business
19%
IBM Open Technology Group
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
[2], Knative [3], and Cloud Foundry [4] projects. The second area is languages and runtime, which is very fundamental to the broader developer community, NodeJS being the biggest with the most
19%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
both OpenSCAP-based rulesets for implementing compliance requirements and rulesets that were previously only available in the form of Red Hat Knowledgebase articles [3] (Figure 1

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice