Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (475)
  • Article (139)
  • News (41)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 67 Next »

44%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
into systems and system files. Yara is an important tool for this kind of proactive malware detection. I've also seen security professionals use Yara during an actual attack. Once they've determined
44%
Tools for automation in the cloud
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Cytonn Photography on Unsplash
of the system configuration to be applied to the target systems and forwards it to the agents. In the cloud context, this sounds a bit strange at first, because the target systems are not actually systems
44%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
a provider perspective; however, if all the terms and descriptions end up in one big pot and are applied arbitrarily, at the end of the day, no one knows what the debate is actually about. Therefore
44%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
. vuln The last script type tests for specific known vulnerabilities. However, reports are only output if vulnerabilities are actually found. Variable Applications Nmap's core
44%
OpenStack Kilo release
04.08.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
. This impression is not always accurate or desirable. The policy applied thus far has actually prevented development: For example, two alternatives exist for the Ceilometer component (Figure 1), both of which offer
44%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
file. Before actually installing Storm, you must first ensure that the necessary interpreters are correctly installed on the system concerned. You can also run the various Storm components on one system
44%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
. The company says RHSS actually extends the capabilities of classical storage systems, pointing to "seamless scalability" and "perfect connections to the cloud." If you read between the lines of the marketing
44%
From Skype for Business to Microsoft Teams
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ying Feng Johansson, 123RF.com
important to the team. Files that are shared on a channel and stored in SharePoint channels are places where conversations take place and where the work is actually done. Standard channels are open
44%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
problem: manipulated billing data. How can a customer measure what they are actually using to have a remedy against apparently false invoices? Protecting Critical Data One crucial question on the way
44%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
. The config files are actually created on the workstations (which can be co-hosted along with the server). Chef provides a default configuration that you can download with the following Git command: git clone

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice