Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 34 Next »

32%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
. 8. The meterpreter .dll now uses the already-established socket for communication, avoiding an additional connect back. See the box titled "Veil-Ready Stagers" for a list of possible options for pen
32%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
, you can rely on tried and tested techniques for secure data management. However, various industry standards such as PCI DSS (Payment Card Industry – Data Security Standard) [8], SSA-16 (Standards
32%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
and analysis engine. Security Onion comes with five tools for network-based monitoring: (1) OpenCanary [7] is a honeypot for intrusion detection; (2) Stenographer  [8], developed by Google, focuses
32%
Network monitoring with Total Network Monitor
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Tono Balaguer, 123RF.com
the Softinventive Lab website [1], and registration is not needed. After installing the package on a computer or server, you can get started. The tool supports up through Windows Server 2012 and Windows 8. No Agents
32%
PowerShell Part 3: Keeping PowerShell in the Loop
10.05.2012
Home »  Articles  » 
 
to a different folder on your system (e.g., in a temporary directory), so you don’t clutter your scripts folder with output. The same rule applies to input, such as systems lists. You have to name your Power
32%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
processes, manage cron jobs, manipulate Iptables rules, load kernel modules, download files with scp, or edit system parameters with sysctl. Rex also provides detailed information about the client systems
32%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
of central rights management rules (rights management services) No central disclaimer configuration No central anti-spam and antivirus check These and other arguments contradict end-to-end email
32%
Dos and don'ts of backing up Kubernetes storage
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Alexander Bedrin, 123rf.com
. This mode obviously involves certain risks and is not supported by all storage drivers. As a rule, filesystem PVs are capable of this mode. Stop First, Back Up The myth of the simple and secure storage
32%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
of the default route or the DNS server. They also include various settings that would involve major overhead if you wanted to implement them on a desktop PC (e.g., individual firewall rules for each app). Don
31%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
and 35 possible rule-based moves at any point in the game. The branching factor in Go is 250, which is why, for example, it took much longer for computers to outperform humans in Go. A common optimization

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice