Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 200 Next »

12%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
to use protected connections such as encrypted virtual private network (VPN) tunnels or private network connections to keep the communication between the systems private. In many cases, cloud providers
12%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
, for example, clearly informs you of the issue (anonymous access to the kubelet is permitted) and also provides appropriate instructions. The next two columns, Failed Resources and All Resources , on the other
12%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © crazymedia, 123RF.com
to this point, the local Hyper-V host is not known in Azure. The Create Hyper-V site entry opens a small window that can be used to download the Microsoft Azure Site Recovery provider and the vault registration
12%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
web content is provided by Nginx, including JavaScript, images, and other CSS files. The application server is uWSGI, which is based on the Django Python framework and is responsible for all dynamic
12%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
in CI, acceptance testing, identity and access management, and so on; and (4) keep pace with evolving tools and technologies that help you with changing and evolving demands and provide the required
12%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
the regular server statement (Listing 2). I took the rewrite and proxy rules provided there from the WordPress documentation, so they might not work for other web applications. The Ansible playbook that rolls
12%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
in /home/user/rules. EDA currently only supports the YAML format for inventories and not the old INI format. In the test, two systems provide log information to Kafka, so the inventory.yml file looks like
12%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
with the url option: $ utils/submit.py --url http://lexu.goggendorf.at/nukgfr2.html In addition to the tool for uploading malware samples, Cuckoo provides some more interesting utilities. For example
12%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
for the implementation of artificial intelligence (AI) and Microsoft Graph, for which the team is already delivering tech previews. Grommunio Next [9] is the first open source Graph API web application to provide all
12%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
for integrating third-party extensions. In many cases, developers don't need all the functionality provided by Docker Engine and just want a much simpler runtime. Kubernetes implemented the Container Runtime

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice