Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1562)
  • News (445)
  • Article (316)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 196 197 198 199 200 201 202 203 204 205 206 207 208 209 ... 234 Next »

12%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
with the url option: $ utils/submit.py --url http://lexu.goggendorf.at/nukgfr2.html In addition to the tool for uploading malware samples, Cuckoo provides some more interesting utilities. For example
12%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
for the implementation of artificial intelligence (AI) and Microsoft Graph, for which the team is already delivering tech previews. Grommunio Next [9] is the first open source Graph API web application to provide all
12%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
for integrating third-party extensions. In many cases, developers don't need all the functionality provided by Docker Engine and just want a much simpler runtime. Kubernetes implemented the Container Runtime
12%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
's built-in tools, you can use the checklists provided by Microsoft to create policies that reduce the existing attack surface, and you can enable or disable the rules in different modes in the Endpoint
12%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
. Licensing Hassle at Docker What kicked off the far-reaching changes to the licensing policy was the acquisition of Docker Inc. by Mirantis in November 2019. The provider now relies on a subscription model
12%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
to your command. When you receive the expected response, you enter another command and so on. Expect works in the same way, except you have to provide the script with commands and expected responses
12%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
provides the vmss2core command for this, but only with the workstation product in versions for Windows and Linux [9]. ESX admins do not have this option. Basically, vmss2core will also work outside
12%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
Name removes it. Inside RADOS One of the explicit design goals for RADOS is to provide seamlessly scalable storage. Admins should be able to add any number of storage nodes to a RADOS object store
12%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
. The ticket screens in version 11 can be customized even more and more clearly than in the past. Dynamic fields can be provided in different orders on different screens and with individual labels. The option
12%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
the honeypot in center stage. On the downside, because ordinary, low-interaction honeypots in particular often provide a characteristic set of simulated services, they can be identified as honeypots

« Previous 1 ... 196 197 198 199 200 201 202 203 204 205 206 207 208 209 ... 234 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice