Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (315)
  • News (203)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 176 177 178 179 180 181 182 183 184 185 186 Next »

9%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
cache (line 4). Last but not least, run apt to install the community edition of Docker on your system (line 5). A call to systemctl (line 6) should then show active as the docker.service status
9%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
: https://github.com/Checkmk/checkmk/tree/v1.2.6b5/agents/windows MySQL tuning script: https://raw.githubusercontent.com/major/MySQLTuner-perl/master/mysqltuner.pl The Author Thomas Joos
9%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
step further with CrowdSec [6]. The principle is similar to Fail2Ban; all participants share the list of blocked addresses. When an unknown attacker attacks its first server, this server informs
9%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
because they follow very similar approaches and promise users and administrators roughly the same thing. Both Qualys Container Security [6] and JFrog Xray [7] are platform solutions that can be integrated
9%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
, not a new idea [6]. Microsoft published two PDF files back in 2012 explaining the underlying technology and offering help with the necessary measures [7]. Conclusions The safeguards for your network must
9%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
, the malicious code is executed. A YARA rule that detects this process can be found in a GitHub repository [6] (Listing 1). The YARA rule can identify and classify malware. Listing 1 YARA Rule Rule
9%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
used in the ticket is documented online [6] and differs from the convention used in the AD msDS-SupportedEncryptionTypes attribute. Tracing the use of the captured login data might also be possible
9%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
or just a simple container runtime like Podman, you might look at Flotta (see the "Flotta Alternative" box). Flotta Alternative The open source Flotta [6] project pursues a similar goal to OCM
9%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
of security. If you previously set a rule for incoming network traffic, now is the time to configure the Source filters. These can be IPv4 or IPv6 address ranges, tags, or service accounts. The Destination
9%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
Manager [5] or HashiCorp Vault [6] to store and access secrets securely. Integrate these management systems for secrets into your CI/CD pipeline to fetch secrets securely during the build or deployment

« Previous 1 ... 176 177 178 179 180 181 182 183 184 185 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice