Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 171 Next »

23%
Setting up DevOps Orchestration Platform
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © J¸rgen Acker, Photocase.com
security groups and subnets. Technologies The following components should be installed and configured before starting: Ubuntu Linux 18.04 Vagrant 2.0.2 [4] VirtualBox 5.2.30 r130521 (Qt5
23%
News for Admins
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
 
impacted platforms at risk. Systems using ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted." The affected products include the sixth, seventh
23%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
against the CIS' best practices guide. Configuration Check with OpenSCAP The following example is based on the OpenSCAP [4] tool, a general scanner that checks systems according to the Security
23%
Data Security vs. Data Protection
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Andrea Danti, 123RF.com
in the United States are subject to the GDPR [4]. Depending on how and for what purpose you collect personal data, you must carry out a DPIA in accordance with the GDPR. Infos AOL privacy incident
23%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
and organizations on which they work. Two of the more popular models include: The Cyber Kill Chain copyrighted by Lockheed Martin [4]. The Mitre ATT&CK model [5]. Just as a good hiker uses different
23%
New plans for Jenkins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Juergen Priewe, 123rf.com
to cloud-based storage solutions. Here, too, scaling is an essential point. Jenkins Configuration as Code (JCasC) [4] is set to play a central role. Jenkins doesn't have to be reinvented completely
23%
End of life for Windows Server 2003
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Antonella Grandoni, Fotolia.com
(MAP) Toolkit [4] provides administrators with a powerful piece of software for identifying Windows Server versions and the installed applications without actually needing to install the program
23%
Virt-builder generates VM images in a flash
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Petris, fotolia.com
, they are also useful for quickly completing some task with a different Linux distribution. Jones demonstrates in his blog how he used virt-builder to build packages for other distributions [4]. The construction
23%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
experts and game theorists" says John Pironti, the chief information risk strategist with data protection specialists Archer Technologies [4]. Security technologies such as video surveillance or RFID
23%
Enterprise resource planning and customer relationship management with open source
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © ximagination, fotolia.com
the installation of updates without the need to upgrade company-specific adjustments. Compiere was one of the pioneers of ERP. Unfortunately, a period of robust growth, which reached its peak with 1.4 million

« Previous 1 ... 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice