Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (221)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 147 Next »

13%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
-popular Travis CI [3] or GitLab CI [4]), which integrates easily with tools you might normally use manually. These tools might be used for database hacking, penetration testing, open network port probing
13%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
of the logfiles of all computers in one place. Analysis of logs with support for correlation analysis. Automatic notification for rule violations. Reporting on networks, operating systems, databases
13%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
a lot of sense to look at the registered formats and protocols such as IANA [6], Schema.org [7], and Alps.io [8]. Infos Request for Comments 707. A High-Level Framework for Network
13%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
of the stack in the Application Layer (OSI model Layer 7) [6]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application
13%
Credential management with HashiCorp Vault
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
on both sides, it can happen that a login is not possible if SELinux is activated and enforced. If this is the case, you might need to modify the rights for access to the network for the SSH login process
13%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
, but the concept is very similar to, for example, Microsoft authentication, where you need to have a user account and permissions to access any resource on the network. Cloud providers have an extensive selection
13%
A storage engine for every use case
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Maikloff, Fotolia.com
SQL and its fork MariaDB is Facebook. Last year, the social network spread the news of an important migration: Its MySQL instances, which relied on the default storage engine InnoDB, were migrated to their in
13%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Suslov, 123RF.com
and over: It's too slow! This drawback might not matter much for web programming, where your program can spend more time waiting for responses from the network and database than actually computing anything
13%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
Analytics includes a number of interesting additions to the simple example. For example, GuardDuty can ignore a list of ingested IP addresses, such as your home network or a corporate LAN, as whitelists. You
13%
Automation with Ansible
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wavebreak Media Ltd, 123RF.com
the host name, IP addresses, names of network interfaces, time zone, hardware information, and many other facts. The documentation contains a comprehensive list of the available facts [3]. Beyond this, you

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice