Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 153 154 155 156 157 158 159 160 161 162 163 164 165 166 ... 216 Next »

42%
Monitoring changes in Active Directory with built-in tools
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Tobias Tullius on Unsplash
. In the baseline itself, Microsoft suggests 192MB but assumes that you are running a Security Information/Incident and Event Management (SIEM) system along with event forwarding and central logging on an external
42%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
), infrastructure-as-code (IaC) misconfigurations, and sensitive information and passwords. Installation Trivy can be installed on all popular Linux distributions and macOS. Alternatively, you can run Trivy
42%
Professional protection for small and mid-size enterprises
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Guido Vrola, 123RF.com
the various firewall functions run. These functions are encapsulated in individual apps (applications) and can be (de)activated as required. Traffic arrives at a physical network interface card
42%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
functions run accurately and in a streamlined way when communication with the flash media is routed entirely via NVMe. One pragmatic solution is a module with a software-defined architecture to connect
42%
Radeon Open Compute Ecosystem
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
, and you're ready to go. I've been working with Linux for a long time. I ran a sysop team before I came to AMD. I used to run big clusters and storage arrays. We were all CentOS-based back then. I brought
42%
We interview Red Hat CEO Jim Whitehurst
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Jim Whitehurst
like cloud and containers, that will be at the heart of IT for years to come. Linux is running some of the most mission-critical workloads in the world. It has retained its relevance because it's shown
42%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
or unwanted changes? What about multiclient capability? What precautions protect the run-time environment? The list of questions could go on forever. The search for answers almost always shows that container
42%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
. The Security Onion [1] project addressed this shortcoming back in 2008. Originally based on Ubuntu, the security suite, which now runs in Docker environments, bundles professional tools for monitoring
42%
Provisioning resources with an Azure-specific language
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © vectortatu, 123RF.com
integrated, or you can use IntelliSense or simply rely on a visual preview of the resources defined in Bicep. Bicep templates can be run on the client side by PowerShell or the Azure command-line interface
42%
Benchmarking a new architecture
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
-board-computer (SBC) that is part of the first production run of the BeagleV-Ahead [1], the latest addition to the BeagleBone family [2] (Figure 1). This new entry is built around a CPU based on the up-and-coming RISC

« Previous 1 ... 153 154 155 156 157 158 159 160 161 162 163 164 165 166 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice