Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%2222%21490 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (203)
  • News (35)
  • Article (12)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 Next »

38%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
on the GitHub platform [2] under the GNU Affero General Public License version 3 (AGPLv3). In this article, I look at the free version's basic feature set. Relay Servers Depending on the operating system
38%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
SAFER2) Windows 10 1607, Device Guard Windows 10 1709, Device Guard becomes Windows Defender Application Control (WDAC) Patchday 30 September 2022: Every Professional version of Windows now
38%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
be detected quickly and security measures initiated at short notice. For the examples in this article, we use the MITRE ATT&CK knowledge base [2] for CTI and the open source Velociraptor digital forensics
38%
Tinkerbell bare metal deployment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by engin akyurt on Unsplash
at the Tinkerbell architecture reveals the Tink Server, Tink Controller, Tink Worker, Hook OS installation environment, and Boots DHCP server (Figure 2). The software follows the requirements of a microarchitecture
38%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB
38%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
is required to create a rule (Figure 2): The firewall rule Name should be as descriptive as possible, and policies should be created by use case and not be too specific about individual ports or IP
38%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
system: Windows Server 2008 R2 SP1 and newer and popular Linux distributions. Microsoft provides exact details of the prerequisites, restrictions, and required rights in Azure [2]. Planning Azure Arc
38%
Keeping Azure VMs up to date
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Brian Welker, 123RF.com
of support (e.g., for Windows Server 2008/2008 R2 and Windows Server 2012/2012 R2) for up-to-date Azure VM operating systems have been free thus far. This point is interesting because even if companies use
38%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
as a Developer Preview at the AnsibleFest user and developer conference in Fall 2022. EDA adapts the "state machine" concept as used by ManageIQ, among others, wherein the state machine is triggered by an event (e
38%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
for NetBox or other common IPAM tools. In general, you can see that Foreman fully embraces its role in an IT setup as a "single source of infrastructure truth" [2] and does not tolerate additional tools

« Previous 1 ... 17 18 19 20 21 22 23 24 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice