Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 154 155 156 157 158 159 160 161 162 163 164 165 166 167 ... 184 Next »

13%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
is spawned from the source AMI (i.e., the official region-specific Ubuntu AMI ID). A micro-instance (by default) spins up from the AMI. 3 A snapshot of that instance is created, which gets
13%
Malware analysis in the sandbox
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Rostislav Zatonskiy, 123RF.com
dynamically without first setting up a Cuckoo environment, then online services, such as malwr.com, hosted by the Shadowserver Foundation [3], are recommended. Upload the file in question, and shortly afterward
13%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
developed two specifications that define the exact tasks of the container runtime [2] and the format of the container images [3]. The OCI specifications therefore ensure which tasks the runtime must perform
13%
A REST API automation strategy for DevOps
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image by Alex Kotliarskyi on Unsplash
EMC, and VMware systems also provide granular quality of service management to prioritize application requirements. Other providers in this area are Nutanix Prism, Pivot3 Acuity, Tintri, and HPE Synergy
13%
Drush vs. Drupal Console
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © iofoto, fotolia.com
management system (CMS) that powers some of your favorite websites. Drush [2] and Drupal Console [3] are both command-line tools that interact with an existing Drupal installation or help you get one up
13%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
to the server using an HTTP request. The malicious functions in MWI contain numerous prominent malware variants according to the results published by Sophos. Including: 1. Zbot 2. Carberp 3. Buhtrap 4. Hawk
13%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
to solve this dilemma. Compliance Undermined The US Department of Defense (DOD) Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) [3] also stipulate
13%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
already been received with great interest. The ownCloud Infinite Scale developers are planning to integrate Authelia into their groupware as an OpenID Connect provider [3]. Ruleset Imagine you want a team
13%
Encrypting DNS traffic on Linux with DoT
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Alexander Grey on Unsplash
web browsers, as well as Windows 11, and a number of public DNS servers also speak this protocol [2]. DNS over TLS (DoT) was standardized two years earlier in RFC 7858 [3]. As the name suggests
13%
Incident response with Velociraptor
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valentyn Ihnatkin, 123RF.com
and the OSQuery [3] monitoring tool. GRR lets you hunt for IoCs and run them over a period of time on all clients connected to your network. The reports are sent to a centralized server where they are available

« Previous 1 ... 154 155 156 157 158 159 160 161 162 163 164 165 166 167 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice