Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"5432 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (161)
  • Article (8)
  • News (3)
Keywords

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 Next »

25%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
programs. This is not always the security solution's fault. An application that is not programmed carefully and fails to comply with RFCs can trip a SIEM signature. In this test, Prelude suspected a DoS
25%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
for different security requirements: GnuPG Desktop [3] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
25%
Snapshot management for Azure VMs
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © meepiangraphic, 123RF.com
Config = New-AzVMConfig -VMName "" -VMSize "Standard_D2s_v3" vmConfig = Set -AzVMOSDisk -VM $vmConfig -ManagedDiskId $newDisk.Id -CreateOption Attach -Windows New-AzVM -ResourceGroupName"
25%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -sL option (nmap -sL) performs
25%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
and then explicitly allow certain users access. It's similar to the deny by default approach I touched on in another article [3]. To achieve this, the /etc/hosts.deny file would look like this: sshd: ALL To allow
25%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
lists all the processes in a window and includes more detailed information on the current process, such as access to directories (Figure 3). Figure 3
25%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.gz cd pen-0.18.0/ ./configure make make install Started with: ./pen -r -p pen.pid -C localhost:4444 -S 3 \ localhost:3306 192.168.56.101:3306:100 \ 192.168.56.102:3306:100 192
25%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [3] that automatically expire. You can
25%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
it to process after loading, which makes it clear that Falco is not an entirely new solution, because the kernel driver is, strictly speaking, legacy software and dates back to the days when eBPF [3
25%
Container compliance with dockle
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
of configuration files). If you need a little help constructing your Dockerfiles, you are gently reminded to look at the best practices page [3] on the Docker website. On Your Marks In this example, I look

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice