Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1130)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 158 Next »

12%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
requires a current JDK (Java Runtime Environment is not sufficient, as the Cloudify developers explain in the documentation). If bootstrapping of the initial cloud works, whether as a test installation
12%
Export and analyze Azure AD sign-in and audit logs
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
to supplement your own overviews by helping you search for irregularities or operations in general. When you create an Azure Sentinel workspace, you will find an overview of the installed dashboards under
12%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
. Pentesting with Empire The Empire framework provides an example of how to use a dedicated server as a platform for the test suite. If Empire is not available on the distribution you are using, you can install
12%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
. Installing Pymp Although I use Anaconda [8], I also use pip [9] when needed. When I examined both Anaconda and pip, the latest version they both had was Pymp v0.01, although the last version released was 0
12%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
. Allowing RDP and SSH To grant remote access to the newly installed VM, create two new rules: one for the network NSG and one for the VM NSG. Access from the Internet to the VM must pass through both NSGs so
12%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
a commonly installed server role in the current server versions of Windows, because it is often used as an administrative front end by third-party applications or applications that use the IIS web services
12%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
than simply steal it. After all, why simply grab a quick data snapshot when you can manipulate information in your favor? Malware installation. Ransomware is quite common, but it can also include
12%
New administration options on Windows Server 2016
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Dmitriy Shironosov, 123RF.com
management of accounts with special privileges. The Basics in Place The Windows security model is complex, and it needs to be to meet a wide variety of requirements. After installing a new server, you
12%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
names in ascending order because the original names are already reserved for other MAC addresses. This approach reveals a major drawback of this concept: An installed and configured Linux cannot be run
12%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
and MySQL and specially designed for security specialists to gives users the option of testing various attacks on web applications in a legitimate way. After installing Microsoft Windows Server 2003

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice