Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (935)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 Next »

26%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
, the malicious code is executed. A YARA rule that detects this process can be found in a GitHub repository [6] (Listing 1). The YARA rule can identify and classify malware. Listing 1 YARA Rule Rule
26%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
used in the ticket is documented online [6] and differs from the convention used in the AD msDS-SupportedEncryptionTypes attribute. Tracing the use of the captured login data might also be possible
26%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
or just a simple container runtime like Podman, you might look at Flotta (see the "Flotta Alternative" box). Flotta Alternative The open source Flotta [6] project pursues a similar goal to OCM
26%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
of security. If you previously set a rule for incoming network traffic, now is the time to configure the Source filters. These can be IPv4 or IPv6 address ranges, tags, or service accounts. The Destination
26%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
Manager [5] or HashiCorp Vault [6] to store and access secrets securely. Integrate these management systems for secrets into your CI/CD pipeline to fetch secrets securely during the build or deployment
26%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
, and update orchestration. However, Azure Arc resources currently incur a cost of $6 per server per month if you want to use Azure Policy guest configuration (free for traditional Azure resources). Other
26%
The basics of domain-driven design
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Christos Georghiou, 123RF.com
for the analysis of domains and the design of application-oriented software was filled by others. Popular methods include event storming [6], domain storytelling [7], or example mapping [8]. These methods have
26%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
of the Java runtime for Drools. For the Python part of EDA to be able to communicate with its Java part, the Java-to-Python bridge jpy [6] is also required. To compile jpy in the container, you then need
26%
Domain-driven design and agile development
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © omnimages, 123RF.com
, the two approaches come together to solve this central problem of software development. If you want to delve further into the subject, you can check out a video online [6] to learn about possible
26%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
by Qualys [6]. You will see numerous comments if something is wrong with your configuration and a rating for the security of your configuration. However, considering the BEAST attack, I would advise against

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice