Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 161 162 163 164 165 166 167 168 169 170 171 172 173 174 ... 232 Next »

12%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
versions of TLS also provide additional evidence that transport encryption in practice comes short of its promise. The architects of TLS 1.3 have thankfully realized as much. As a result, TLS 1
12%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
of the process memory, the linker collects all exposed functions from the libraries and links them against function calls. If a function is provided by more than one library, the first match is used for linking
12%
Secure microservices with centralized zero trust
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Christopher Ruel on Unsplash
material of the organization's root certification authority (CA) and any necessary intermediates sufficient to establish the SVIDs' chain of trust. Federation SPIFFE also provides for federation between
12%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
. In this article, I explore a relatively new addition to Lambda functions in AWS called "layers" and, with the use of a Bash layer provided on the GitHub page by author Graham Krizek [3], I run a Bash script
12%
Setting up DevOps Orchestration Platform
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © J¸rgen Acker, Photocase.com
of various applications for installation on the deployed or imported infrastructure. Many sample Ansible playbooks have already been provided, forming a basis on which to extend the framework. A Docker module
12%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
Modern software such as large databases run on Linux machines that often provide hundreds of gigabytes of RAM. Systems that need to run the SAP database (HANA) in a production environment
12%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
HTTPD provides the Timeout directive to deal with user-induced denial-of-service problems like this and allows monitoring of the web server's I/O channels, such as the TCP connection to the browser
12%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
to the manufacturer, a grommunio instance can be integrated easily into an existing Windows Active Directory (AD) domain. Linux provides the operating system (openSUSE, Ubuntu, Red Hat, Raspberry Pi OS), which makes
12%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
a header with a source and target port to each IP packet. The header also contains the packet size in bytes and a checksum. UDP is fast, but it doesn't provide the kind of verification and connection
12%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
proxy, it protects web applications on other web servers, such as Tomcat or IIS. Breach also provides a collection of core rules that guarantees the basic security of the web server. Comprehensive

« Previous 1 ... 161 162 163 164 165 166 167 168 169 170 171 172 173 174 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice