Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1135)
  • News (397)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 152 153 154 155 156 157 158 159 160 161 162 163 164 165 ... 184 Next »

18%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
Management (IAM) support common open identity standards – for example, Security Assertion Markup Language (SAML) 2.0, OpenID Connect, and OAuth 2.0 – to facilitate identity federation. To secure your root user
18%
Verifying your configuration
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kritiya Sumpun, 123RF.com
you solve config misconfiguration and parity issues in the modern cloud-driven IT world? Open source solutions come to the rescue. In this article I describe how to use a tool called goss (an acronym
18%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
, which the user accesses from the browser. Authentication Required To protect the user accounts, Yesod provides libraries, which you use to implement the login procedure. The library includes Yesod.Auth.Open
18%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
For 20 years, FreeBSD [1] has been an efficient, secure, and stable open source operating system. Now version 10 has been released with some innovations. FreeBSD is part of the Unix family
18%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
be initiated via options for file operations using the O_DIRECT option for open() or DONT_NEED with fadvise(), for example. Unfortunately, very few applications use direct I/O, and because a single
18%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
are used to protect the server from unauthorized access. Public blacklists (e.g., OpenBL.org [1]) distribute the IP addresses of honeypot systems that help document attacks and distribute the IP addresses
18%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
to for signaling (Figure 8) and open up the firewall accordingly. The WebSocket Secure (WSS) default port is 443, so this should work in most cases. Web proxies should support the HTTP CONNECT method on port 443
18%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
Information Protocol (RIP), Open Shortest Path First (OSPF) protocol, or Enhanced Interior Gateway Routing Protocol (EIGRP) for internal networks, BGP is the only Exterior Gateway Protocol (EGP). As such
18%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
. Understanding the tactics used is particularly beneficial for blue team members tasked with defense and implementing security controls. Main Entry Points To compromise containers, a door has to be open
18%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
a web browser to open the page https://microsoft.com/devicelogin and enter the code GY2PXXXX to authenticate. Enter your details in the browser when prompted and prepare to be amazed at how quickly you

« Previous 1 ... 152 153 154 155 156 157 158 159 160 161 162 163 164 165 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice