Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 160 Next »

38%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
Google Authenticator. The sender and recipient initially agree on a shared secret key; after a defined period of time, typically 30 seconds, a cryptographic hash, the one-time password (OTP), is computed
38%
What to Know Before Moving into HPC
08.04.2025
Home »  Articles  » 
configured, try ssh -ing to your experimental system from your experimental system. It should ask for your password. If it does, and you can log in to your system, you are golden. Next, try ssh -ing
38%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
. The reason is simple: The browser does not consider the intermediary proxy to be trustworthy because it considers the mitmproxy certificate invalid. Once the proxy server is activated, you can pick up
38%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
might be duplicating what /var/log/auth.log  does, but you can add whatever extra information you want in the wrapper script and add messages the system log. Environment Modules In the HPC world
38%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
because of its simple and clear-cut operation, although it does give you a useful collection of data relating to the hardware of a Windows system. Unfortunately, the software seems to be under sporadic
38%
Serverless applications with OpenFaaS
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kier in Sight Archives on Unsplash
to these templates or ensure your Dockerfiles use non-root users. The Helm chart even has a setNonRootUser=true option that forces functions to run as non-root as a safety net. OpenFaaS does not allow deploying
38%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
to allow remote access client connectivity to the Pritunl VPN server, and configure a VPN user account that uses Google Authenticator as part of the secure MFA process. It is important to note that all
38%
Inventory and manage your IT systems
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Edryc James P. Binoya on Unsplash
or applications, but also to identify and shut down potential vulnerabilities. The intuitive user interface does not require in-depth technical knowledge, and the installation and setup process is straightforward
38%
Advanced security in Windows Firewall
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Andrius Repsys, 123RF.com
notification when a new program is blocked. Make sure that you press the Back button to go back to the main view, because the feature does not open a separate window. If you click the corner Close icon here
38%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
does not apply the settings. For that, you need to assign the new policy to an organizational unit or domain. The imported settings are effectively a normal Group Policy. After exporting the baseline

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice