Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1375)
  • News (404)
  • Article (301)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 168 169 170 171 172 173 174 175 176 177 178 179 180 181 ... 209 Next »

17%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
Multifactor authentication (MFA) is another important security feature in Windows 10. The MFA options are based on the open standards of the FIDO Alliance and should reduce the need for additional devices
17%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
configuration. The first step is to copy the jail.conf file, which you shouldn't edit, to jail.local, which you should edit: $ sudo cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local Open jail.local in your
17%
Project management with Phabricator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Joy Fera, fotolia.com
The open source world offers many project management tools. The classic bug trackers such as Mantis and Trac offer numerous additional features, as well, but they are often outdated. A modern
17%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
used in PowerSploit is slightly modified and only works in memory. Traces are not left behind on the hard disk. Conclusions PowerShell 5 opens up new attack vectors for breaking into corporate networks
17%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
mesh architecture showing in-band application traffic (blue) and out-of-band control traffic (green). Sidecar Service Mesh Implementations The most common open source sidecar-based service meshes
17%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
configuration. If you are aiming for more precise control of the synchronized attributes, check Azure AD app and attribute filtering . The wizard then opens two further steps for you, in which you can define your
17%
Successful protocol analysis in modern network structures
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © konstantynov, 123RF.com
on the network, even when virtualization is involved. A legacy protocol analysis tool (e.g., the open source utility Wireshark) is a standalone device or a piece of software on a PC that identifies problems
17%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
normal users with the task of viewing EMET events. Next, click the Apps icon in the ribbon bar. This will open a new window for application configuration and lists all protection functions for individual
17%
Landscape
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
with the Landscape server. They use the typical HTTP or HTTPS ports 80 and 443, which are open for outbound connections anyway on most networks and firewalls. Every 30 seconds, the Landscape client sends
17%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
combines the open source Cassandra [6] database with the also free Apache TinkerPop [7] graph computing framework to create a successful product. Today, graph databases are in production use in almost all

« Previous 1 ... 168 169 170 171 172 173 174 175 176 177 178 179 180 181 ... 209 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice