Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: thread medicine https://simplemedrx.top ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • Article (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 Next »

22%
Forensic analysis with Autopsy and Sleuth Kit
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Tomasz Pacyna, 123RF.com
. Targeted Knowledge Gain If you press the Timeline link in the icon bar at top, you will see an overview of messages according to parameterizations. For older systems with many entries in the system log
22%
News for Admins
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
 
Exim to mitigate against this ongoing threat. If your Linux mail server is running a version of Exim older than 4.93, you need to upgrade immediately. Original source: https://media.defense.gov/2020
22%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
and select R Script from the drop-down menu. Listing 1 RFIviz.R 01 ## Plot Top 10 IP addresses from RFI attacker logs 02 ## Russ McRee, @holisticinfosec 03 04 library(data.table) 05 library
22%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
by an external or internal threat. Generally, the assessing organization will perform a few common steps – outlined here and discussed in this article – when conducting a VA project for another organization
22%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
to vulnerabilities, and also developed STIX and CyBox, which are used to exchange threat information and attack indicators. The MITRE ATT&CK and D3FEND knowledge databases offer techniques that let you retrace
22%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
to answer the following questions – if only to stay on top of the latest developments: Which machine learning principles apply to cybersecurity? What do typical scenarios for defense and attack look
22%
Tune your databases
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Altomedia, 123RF.com
with lots of new features, including several enhancements to the Query Analytics function. A new Security threat tool, run daily, checks for common database security issues and flags any non
22%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
-side misconfiguration or weak cryptographic primitives are finally a thing of the past. Linux server administrators can finally breathe a sigh of relief. Infos 2018 Thales Data Threat Report: https
22%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
. Next-generation firewalls, web gateways, email security, endpoint security – the security solutions in the individual sectors are often piled up on top of one another. The unintended consequence
22%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
information systems and the data that is housed on those systems from a threat actor. The US currently requires DoD contractors to include Defense Federal Acquisition Regulation Supplement (DFARS) clause 252

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice