Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (578)
  • Article (161)
  • Blog post (5)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 75 Next »

15%
DBaaS: EnterpriseDB
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© carther, 123RF.com
EnterpriseDB decide to include configuration options rather than going with the "just works, don't fiddle" trend? The history of the product gives the background needed, as Padir explains: We employ a number
15%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
is to prevent such an outbreak, but that is easier said than done. The year 2019 alone saw two serious security vulnerabilities [1] [2]. Fortunately, this was not the case in 2020. However, this tranquility might
15%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue
15%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © 123RF.com
Press website and make it deliver optimally with the use of Amazon CloudFront [1] and a potent plugin, W3 Total Cache [2]. How your site performs can help or hinder your success online, whether you have a simple
15%
User File Recovery
19.04.2018
Home »  HPC  »  Articles  » 
and countered the policies. This situation was infrequent, typically for a critical project and a critical piece of data, but more often than not, it followed the old adage “the squeaky wheel gets the grease
15%
Central logging for Kubernetes users
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © zlajo, 123RF.com
of the core requirements of the developers. Because Loki requires fewer resources than ELK, it does not need massive hardware resources. Like Prometheus, Loki is a Go application, which you can get from Git
15%
The path forward
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
 
Chain Project, an initiative that helps make open source licensing simpler and more consistent [2]. We have also been doing lots of upstream work on important projects such as openATTIC (now integrated into Ceph
15%
OPA and Gatekeeper enforce policy defaults in Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Mac Gaither on Unsplash
, at least not yet. It is far beyond the scope of this article to go into detail about Rego and how to use Rego in OPA for Kubernetes. The examples in Listings 1 and 2 are taken directly from the docs
15%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
host images being targeted in the cloud but that 89 percent of cryptojacking attacks use XMRig-related libraries and more than 50 percent of Cobalt Strike (https://www.cobaltstrike.com/, a commercial
15%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
causes problems. Most important is the often missing ability to communicate between isolated solutions because a wide variety of security tools are implemented in the silos – and usually more than one

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice