Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 58 Next »

52%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
on Alice. The good news is that the L2 agent automatically configures the DNAT rule on the compute nodes. The bad news is that you need to configure a route for the return channel from the cloud controller ... OpenStack workshop, part 2: OpenStack cloud installation
48%
Simple Event Correlator
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © cepixx, 123RF.com
the many similar programs that can monitor logfiles. However, SEC has a lot of other rule types that expand its functionality considerably (Table 2). Table 2 SEC Rule Types Rule Type ... The Simple Event Correlator is a small Perl program that supports analysis of logfiles with a view to security. In this article, we provide an introduction to SEC's rules and actions.
47%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
given the above rules? In Figure 3 you can see the server illustrated in Figure 2 with 6TB of RAM and four sockets, each with 28 cores or 56 hyperthreads. If you now create a VM, you could get ... Massive, performance-hungry VMs require proper handling to meet their dynamic requirements. We give you some rules to help size these monsters properly.
47%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
of the logfiles of all computers in one place. Analysis of logs with support for correlation analysis. Automatic notification for rule violations. Reporting on networks, operating systems, databases ... Graylog security information and event management combines real-time monitoring and immediate notification of rule violations with long-term archiving for analysis and reporting.
47%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
of an Active Directory infrastructure is defined by user account passwords. The free Lithnet Password Protection for Active Directory (LPP) provides more flexible rules than would be possible with group policies ... Lithnet Password Protection for Active Directory provides flexible rules beyond that possible with group policies alone and prevents the use of previously compromised passwords.
45%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
distributions. Table 1 Udev Storage Locations Distribution Path Ubuntu 12.10, Debian 7.0, SLES 11 SP2 * /etc/udev/rules.d/70-persistent-net.rules* /lib/udev/rules.d/75 ... For many cloud admins, the kernel's udev system and associated rules equate to infinite renumbering of network interfaces and manual adjustment. We show how to keep on top of these tasks without
45%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
, it must be possible to define which requests cross these boundaries. The means of choice goes by the name of Network Security Groups (NSGs). Rules-Based Traffic Control On Azure networks, NSGs act like ... configuration of access rules.
44%
Do You Know Juno?
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © alexskopje, 123RF.com
was not completed for the Conntrackd plugin. As a general rule, though, Neutron will have HA features for L3 networks in Juno, and you can regard this change as a milestone (Figure 2 ... The OpenStack cloud platform plays a major role in the increasingly important cloud industry, so a new release is big news for cloud integrators and admins. The new version 2014.2 "Juno" release ... What's new in OpenStack 2014.2 "Juno"
43%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
Desktop Services (RDS) or Active Directory rights management CALs – something that is normally not allowed. The Foundation and Essentials editions of Windows Server 2012 R2 are the exceptions to this rule ... rules that apply.
43%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
. If you want to set the rule Block executable content from email client and webmail to audit mode; you would need to run the cmdlet: Add-MpPreference -AttackSurfaceReductionRules_Ids be9ba2d9-53ea-4cdc-84 ... The sum total of all possible points of attack can be defined as the attack surface, and you need to take every opportunity to minimize it to the extent possible. Windows has built-in rules

« Previous 1 2 3 4 5 6 7 8 9 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice