Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 83 Next »

36%
Secure authentication with FIDO2
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lassedesignen, 123RF.com
application with FIDO2, I will refer to the sample application as a guide and look for the important components in the examples for an abstract service of your own. As a concrete use case, I will be looking ... The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service. ... Secure Login with FIDO2 ... Secure authentication with FIDO2
35%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
to me (Listing 2). Listing 2 Action Settings 01 # ban the IP & send an e-mail with whois report and include relevant log lines to the destemail 02 action_mwl = %(banaction)s[name=%(__name__)s ... For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight. ... fail2ban ... The fail2ban intrusion prevention framework
35%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
application, on the other hand, a very high value directly improves the user experience, because the latency caused by the connection setup can be avoided in the best case. A high value for http2_max ... HTTP/2, the current representative of the HTTP family, offers several advantages for website operators and their users if the protocol is correctly adapted to the individual scenario. ... HTTP/2 for Nginx ... Setting up HTTP/2 for Nginx
35%
What's new in Ansible 2.0
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Viktor Gladkov, 123RF.com
/blog/2013/12/08/the-origins-of-ansible Ansible: http://www.ansible.com Announcement: http://www.ansible.com/blog/ansible-2.0-launch Installation guide: http://docs.ansible.com ... Ansible 2.0 ... What's new in Ansible 2.0
35%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
-comes-after-email/422625/ "John Chambers last keynote as CEO of CISCO," Cisco Live 2015, San Diego, CA, https://www.youtube.com/watch?v=ujBLqLFNr0s (timeline 28:00) Cisco-Kansas City agreement: https://newsroom.cisco.com ... The Internet of Everything, a fully networked and analyzed society, seeks to enhance the quality of life of all people and drive new technologies, products, services, and markets. But where ... The Internet of Everything
35%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
distributions support WSL1 and WSL2 differently in some cases. Each distribution can be upgraded or downgraded at any time. WSL1 and WSL2 distributions also can be run side by side. However, to run Docker ... Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2. ... Containers + WSL2 ... Use Linux Containers with WSL2 on Windows
33%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
are the processor, RAM, network speed, and Active Directory response times. In the case of virtual servers that you run with Hyper-V on Windows Server 2008 R2, you will definitely want to install Service Pack 1 ... Performance monitoring in Windows Server 2008 R2
32%
OpenStack workshop, part 1: Introduction to OpenStack
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
The end of September was marked by the popping of champagne corks down at the OpenStack project: Right on schedule, the project released a new version of its own cloud environment, OpenStack 2012.2 ... The OpenStack developers have released the new 2012.2 version of their protégé, code-named "Folsom." What potential does OpenStack offer, and what distinguishes it from other clouds? We provide ... Intro to OpenStack 2012.2
32%
Secure passwordless logins with FIDO2 and LDAP
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
specifically use when selecting the private key: attributetype ( 1.3.6.1.4.1.56227.1.1.2 NAME 'fido2credentialId' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE ) This identifier ... Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication. ... Store FIDO2 info in LDAP ... Secure passwordless logins with FIDO2 and LDAP
30%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in particular – to identify their attack surfaces more precisely and respond more quickly to changes in their risk situation (see the "Prevention and NIS2" box). In their Leadership Compass publications on ASM [1 ... The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.

« Previous 1 2 3 4 5 6 7 8 9 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice