Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 58 Next »

32%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
such as Webmin [2], which accesses the basic system through Perl scripts, Cockpit works exclusively and directly with systemd, as can be seen in the software versioning: The current version is 217. A glance
32%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
the complete Metasploit Windows payload system [2]. Veil is capable of bypassing antivirus solutions deployed on endpoints during a pen-testing session. To bypass antivirus protection, Veil generates random
32%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
. The rules could look something like Listing 2. In the end, Prometheus knows the labels that Kubernetes assigns its nodes, applications, and services. Listing 2 02-prometheus-configmap.yml (Extract
32%
Accessibility wherever you are with Mobile IPv6
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Fotograf, 123RF.com
and designates special rules that can be configured on firewalls for MIPv6 packets. Because MIPv6 communication basically first uses the home agent and the home address, the home address is inserted in the type 2
32%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
:ServerCore-FullServer /featurename:Server-Gui-Shell /featurename:Server-Gui-Mgmt Until Windows Server 2008 R2, the binaries for features and server roles were also stored on the server, even if they were not installed. This approach
32%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
completely automate the process of checking the entire container stack of an environment for security and compliance problems according to accepted rules (e.g., from the US National Institute of Standards
32%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
as a Docker container. All packages are available directly from the download page [2]. Taking Countermeasures OSSEC offers a range of countermeasures to help you respond to security incidents
32%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
like Linux in 2000, "the cloud" is currently approaching the "Peak of Inflated Expectations" rapidly [2]. However, Linux had numerous organizations and companies to help it move from inflated
32%
Backup and restore disks
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Omar Flores on Unsplash
backups of large drives. For smaller data carriers, an external USB 2.0 hard drive is often sufficient. As a general rule, it is important to note that Rescuezilla does not restore to drives with less
32%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
to upgrade to ntp-4.2.8p4, which fixes this vulnerability. If an upgrade isn't possible at this time, the Talos report describes some tips for firewall rules that could help mitigate the problem

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice