Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1126)
  • News (395)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 ... 183 Next »

18%
Regular expression security
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Jakub Jirsak, 123RF.com
results in a large state machine with a correspondingly long run time. The Open Web Application Security Project (OWASP) lists the regular expression denial of service (ReDoS) [1] as an attack and shows
18%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
with something. The syscalls man page reports, “The system call is the fundamental interface between an application and the Linux kernel.” Simply think of every task, such as opening a socket for network
18%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
between an application and the Linux kernel." Simply think of every task, such as opening a socket for network communications, mounting a disk volume, or even creating a directory, as needing some form
18%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
, and offensive security testing professionals adapt their attacks and test their own systems and websites against these vulnerabilities. The OWASP Top 10 project [1], an "… open community dedicated to enabling
18%
Network performance in-terminal graphics  tools
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Lucy Baldwin, 123RF.com
among those being slurm [13] (Figure 7). Slurm is a simple and extremely lightweight way to check that the network has a heartbeat, finding a place among the multitude of permanently open terminal windows
18%
Software inventory with PowerShell
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Andrea De Martin, 123RF.com
: > Return = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey ("$Key", "$ComputerName") Universal Approach Microsoft provides a software installation tool for the command line in Windows Management
18%
Translation tool with version control
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Yang MingQi; 123RF.com
Hub [2]. The Git repositories can also be installed directly in OpenShift. The setup is described in detail in the Weblate documentation [3]. Weblate also offers a hosted version [4], in which the setup
18%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
Although not always the first choice, Docker Engine will be used extensively as the default container runtime in Kubernetes and OpenShift on cloud-native infrastructure for some time to come. So
18%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
supports IP-based threat lists. Two of my favorites are Tor exit nodes [3] and Open Threat Exchange (OTX) community feeds from AlienVault [4], but you may find some others by just doing some research
18%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
with clues for how to escalate privileges. According to a report at TechWorm http://www.techworm.net/2016/02/russian-hackers-spying-linux-pc-sophisticated-malware-fysbis.html, Fysbis can "… open a remote shell

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice