Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub 12%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (69)
  • Article (10)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 Next »

68%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
attached (Figure 12). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass ... 2022
68%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
, the Auth component first creates a valid X.509 certificate with restricted validity (usually 12 hours) and sends it back to the client. The second phase of establishing the connection then follows. Teleport ... 2022
68%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
.05 FT (4 cores) 1.69 17.26 67.7 IS (4 cores) 0.6 2.16 8.2 LU (6 cores) 5.13 41.8 MG (4 cores) 1.2 3.8 39 ... 2022
68%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
, 12 openSUSE Tumbleweed, Leap 15.3, Leap 15.2 Oracle Linux 8.5, 7.9 Mitigating such an attack would rely largely on system policies being enabled that prevent the features required ... 2022
68%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
://github.com/AICoE/prometheus-anomaly-detector AIOps: Anomaly detection with Prometheus, by Marcel Hild, Linux Foundation, https://events19.linuxfoundation.org/wp-content/uploads/2017/12/AIOps ... 2022
68%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
NULL, 10 account VARCHAR(40) CHARACTER SET 'utf8' DEFAULT NULL, 11 PRIMARY KEY (id) 12 ) Engine=InnoDB CHARACTER SET 'latin1'; 13 14 CREATE UNIQUE INDEX name_index ON domains(name); 15 ... 2022
68%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
, this step can take some time. In this setup, Git writes its data at a rate of about 1.2GB per minute. The speed also depends on whether Git needs to write small or large files. During the write process you ... 2022
68%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
and deletes them. Documents you have created with the apps being interrogated are, of course, not affected by this procedure. The tool on a macOS 12 system reliably found all linked directories and folders ... 2022
68%
Linux infrastructure servers for small and midsize businesses
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © stillfix, 123RF.com
introduced update is based on a 12-month-old CentOS/RHEL release, with no sign of a new version based on Rocky Linux/RHEL 8. NethServer: Looking to Break New Ground NethServer [2] is an open source project ... 2022
68%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
no restrictions. To create inexpensive, small systems in Azure, setting the filters to 0-2GB RAM and 1-2 CPUs would get you to the B1s or B1ls (Linux only) series. The B1ls series is fine for up to 100 systems ... 2022

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice