Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1005)
  • Article (294)
  • News (153)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 Next »

16%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
of functions comparable to those of its NFS counterpart, but using the SMB protocol instead of NFS. This option is interesting in environments with existing Windows file servers. The GlusterFS [6] distributed
16%
Get to know Azure Files and Azure File Sync
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © moovstock, 123RF.com
is available for Windows Server 2012 R2, 2016, 2019, and 2022 [6]. The setup routine shows the ubiquitous license agreement, prompts you for the installation path, and optionally uses a proxy server
16%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
of a general architecture for distributed monitoring. Some systems such as Checkmk [5] or Zabbix [6] support this type of architecture by default. However, the emergence of distributed monitoring strategies
16%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
step further with CrowdSec [6]. The principle is similar to Fail2Ban; all participants share the list of blocked addresses. When an unknown attacker attacks its first server, this server informs
16%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
because they follow very similar approaches and promise users and administrators roughly the same thing. Both Qualys Container Security [6] and JFrog Xray [7] are platform solutions that can be integrated
16%
Chatbots put to the scripting test
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © lexandersikovl, 123RF.com
or storyteller LLMs. For this article, I used the CodeUp-Llama-2-13B code generation model [6], which makes do with the 12GB of VRAM provided by the RTX 4090 in the lab computer. Again, I asked the coding model
16%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
, not a new idea [6]. Microsoft published two PDF files back in 2012 explaining the underlying technology and offering help with the necessary measures [7]. Conclusions The safeguards for your network must
16%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
, the malicious code is executed. A YARA rule that detects this process can be found in a GitHub repository [6] (Listing 1). The YARA rule can identify and classify malware. Listing 1 YARA Rule Rule
16%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
used in the ticket is documented online [6] and differs from the convention used in the AD msDS-SupportedEncryptionTypes attribute. Tracing the use of the captured login data might also be possible
16%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
or just a simple container runtime like Podman, you might look at Flotta (see the "Flotta Alternative" box). Flotta Alternative The open source Flotta [6] project pursues a similar goal to OCM

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice