Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (355)
  • Article (83)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 45 Next »

19%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
19%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
19%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
: "Red" 08     Model year:  1988 Listing 2: JavaScript Code for Listing 1 01 // JavaScript 02 var autos; 03  04 autos = { 05   bmw: { 06     color: "Blue", 07     Model year: 1990 08   }, 09   vw: { 10
19%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
-RSA-AES256-GCM-SHA384 05 DHE-RSA-AES128-GCM-SHA256 06 DHE-RSA-AES256-GCM-SHA384 07 ECDHE-ECDSA-AES128-SHA 08 ECDHE-ECDSA-AES256-SHA 09 ECDHE-ECDSA-DES-CBC3-SHA 10 ECDHE-RSA-AES128-SHA 11 ECDHE-RSA-AES256-SHA
19%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
rreport import reporter 04 import rpy2.robjects as ro 05 06 devs = importr('grDevices') 07 08 main = "3. Kepler's Law" 09 path = "tmp/Kepler3.png" 10 11 rep = reporter("galaxy", "comets", ["semaj
19%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
a Flask app and set the OpenID connect config params 06 app = Flask(__name__) 07 app.secret_key = 'hu5t82LXfYKtr3XFcPeAYaCBWFK8DcI1' 08 app.config['OIDC_CLIENT_SECRETS'] = 'oidc-config.json' 09 app
19%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-algorithm sha1; 07 encryption-algorithm 3des-cbc; 08 } 09 policy test123 { 10 mode main; 11 proposals Phase1-3des-sha; 12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa
19%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
the Debian-based, distributions install it along with openvpn – one exception being Ubuntu, which only offers easy-rsa starting with Cosmic Cuttlefish (Ubuntu version 18.10) [3]. The successor, Easy-RSA 3
19%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
-WLyW-XDPI-7w3E-SK9BYf   LV Write Access        read/write   LV Creation host, time laytonjb-APEXX-T3-04, 2023-10-14 08:38:33 -0400   LV Status              available   # open                 0   LV
19%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
such as WordPress, Drupal, and TYPO3" (https://thehackernews.com/2019/09/php-programming-language.html). Out of all these vulnerabilities, the most critical one was found in the Oniguruma library that comes

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 45 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice