Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 133 Next »

15%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
in Listing 1 shows what you need to know. Note that you will need to open another terminal to continue with other commands from this point on, because the server will keep that window open as it runs
15%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
) without a problem. It is handy to give zones their own file by adding a line in unbound.conf pointing to a separate file: include: /opt/unbound/etc/unbound/a-records.conf include: /opt
15%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
the latest version of SET available and the one you're currently running (Figure 4). It also points you at the GitHub page [14] for more information. Figure 4
15%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
GitHub page, as belonging to "Docker analysis & hacking tools." A YouTube video about the tool [4] jumps straight to the point by admitting that it dissects Docker images and abuses an image registry
15%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
they are responsible, run on this infrastructure. Usually the transfer point is the single VM and, more specifically, its Linux kernel. If you have built a setup and want to put it through its paces or see how a cloud
15%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
| Download YAML or as a JSON file with  File | Download JSON. You then install the Swagger UI and point it at the JSON or YAML file. To do so, first download the current source code archive for the Swagger
15%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
kibana Once again, I can then create the System V scripts: $ sudo update-rc.d kibana defaults 95 10 Once I have Kibana running, I can then use the web interface to point it toward my Bro log directories
15%
NVDIMM and the Linux kernel
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Denis Dryashkin, 123RF.com
copies 4GB from the null device /dev/zero to the PMEM mount point. The oflag = direct flag helps bypass the kernel's buffer cache and thus taps into the power of the physical NVDIMMs (from the preliminary
15%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
.md resources The previously unused file directory becomes relevant at this point. Files deployed there are transferred to the nodes on request. Download the ZIP file from the Microsoft website and store
15%
Integrating scripts into Group Policy
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © abidal, 123rf.com
and commands in a batch file is specified in the Profile tab in the user's Properties dialog. At this point, you also save the local user profile on a share. For the scripts to launch when users log on, you

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice