Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 83 Next »

8%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
8%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
ensure that admins who are not totally network-savvy are happy to deal with DevOps and related areas. Traditionally, this has not been the case. Many administrators who grew up in the classic silo thinking
8%
Best practices for secure script programming
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Jorge Fernández Salas on Unsplash
, but deployment in a Docker or other cluster changes the situation. The most common problem is the use of the #!/bin/sh sequence, or "shebang," which on Unix, is the first line of a script. According to the POSIX
8%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
or humanly readable; for example, iso.org.dod.internet.mgmt and 1.3.6.1.2 refer to the same object, and they can be used as equivalents in queries. SNMPv1 and SNMPv2 use what are known as "communities
8%
Visualizing kernel scheduling
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 36clicks, 123RF.com
/225/Command-Line-at-cron-anacron/ Scheduling policy: https://www.oreilly.com/library/view/understanding-the-linux/0596005652/ch07s01.html NUMA: https
8%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
of withstanding the current threat situation. Why should a firewall not be sufficient against these directed attacks? A city wall is a good example of what can happen: It is constructed to protect a city against
8%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
for I/O access to the data file in many cases. In fact, one of the main reasons for the existence of the shared memory pool is that it serves as a single source of truth when different sessions need read
8%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
-on-LAN [2]. Additionally, you can add multiple connections to a cluster. In this case, all of the connected machines will run any commands you type in parallel. Starter's Gun Because this jack
8%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
this, we will look at an example that may be fictive but is nonetheless not too far from today's practical SaaS applications. Case Study Corporations can outsource the email service to a SaaS provider
8%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Stephen Pedersen on Unsplash
2018, the project team released version 1.0; now, version 1.5-rc2 is available for download and promotes the software with the slogan "The speed of containers, the security of VMs." Compatible Run

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice