Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 148 149 150 151 152 153 154 155 156 157 158 159 160 161 ... 183 Next »

13%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
the security team to focus on the genuinely important cases (Figure 3). This means that you want in-depth information, the ability to find similar cases, and the ability to trace precisely why the message
13%
Export and analyze Azure AD sign-in and audit logs
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
more attractive, add two more lines and display a pie chart instead of a flat list (Figure 3): AuditLogs | where TargetResources contains "a0fdc91a-a1b2-4ec5-b352-03bda610be0e" | where Time
13%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
, specialized meta-frameworks are available on GitHub, PowerLine [3] being just one example. PS2EXE [4] also follows a similar approach, although with completely different administrative goals. Another option
13%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
in a linear manner in the second half (Figure 3). Figure 3: The mean load value increases in the second half of the curve. Although this effect is much
13%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
and pressing Enable just-in-time policy . As soon as you enable this, you will discover that the ASC has already created all the required rules and prioritized them as necessary (Figure 3). Each VM is given
13%
Tuning Ansible
09.05.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
with long dynamic DNS names). Figure 3 shows the comments in the main config file. Again, tune as needed. Figure 3: Pipelining comments as shown in /etc
13%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
now have interfaces, including Nmap. Figure 3 shows a typical Nmap scan using the OSScan option (-0) that you've seen a thousand times. Notice with this particular scan that Nmap is having a hard time
13%
AWX: Web-Based Console Manager for Ansible
13.07.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© Maksym Shevchenko, 123rf.com
: Just complete as valid YAML please     command: date +%F Hold On a Minute If you have followed the steps above verbatim, you have probably managed to save the new project but noticed at the bottom of the screen (Figure 3) a red exclamation
13%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Wayne Daniels, 123RF.com
, SAL will decode the response message in a callback function and update the API output parameters with statistics and processed payload. Figure 3 shows the QuickAssist driver architecture
13%
Developments in storage management
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by DESIGNECOLOGIST on Unsplash
. The ability to connect to the cloud and manage it with Amazon Simple Storage Service (S3) as the de facto standard for object storage is now an option for storage systems virtually everywhere. In addition

« Previous 1 ... 148 149 150 151 152 153 154 155 156 157 158 159 160 161 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice