Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb"22 00s Llorente 13 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (223)
  • Article (61)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 Next »

9%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
and system owners, which makes it easy to provide protection against exploits. Brute force attacks on SSH servers, the lack of encryption in communications, and distributed denial of service (DDoS
9%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
the long name unwieldy, you can create a symlink: ln -s volatility_2.6_lin64_standalone vol Also, you should create a profiles subdirectory to give you space for the profiles of the systems to be analyzed
9%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
of only 56 bits. The 1990s, when SSLv2 was being developed, were the hot phase of the "Crypto Wars." Strong encryption technologies were forbidden in the United States. Many states talked about only
9%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
of the setup, grommunio informs you of your choice of settings. In the next step, you define further installation parameters like the correct mail domain(s). Regardless of the platform on which grommunio
9%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
9%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
.path.isfile( "/opt/openvpn/ca/keys/" + username + ".crt"): 13 # print "Cert for " + username + " exists" 14 a=1 15 else: 16 17 # get user details 18 detailsurl
9%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
Service (Amazon S3) 19 - ami plugin for Amazon Simple Storage Service (Amazon S3) 20 - sftp plugin for SSH File Transfer Protocol 21 - ebs plugin for Elastic Block Storage 22 - local plugin
9%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
_path "/var/chef/nodes" 13 openid_store_path "/var/chef/openid/store" 14 openid_cstore_path "/var/chef/openid/cstore" 15 search_index_path "/var/chef/search_index" 16 role_path "/var/chef/roles" 17
9%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
for increased container security. gVisor Google has implemented in the gVisor [13] project a watered-down variant of starting a second kernel. Two major challenges arise in establishing an additional operating
9%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
algorithms for the search. For example, a stored three-dimensional vector could be assigned the values [1.4, 3.8, -0.8]. Each query to the database is also translated into a vector (e.g., [1.3, 3.5, -0

« Previous 1 ... 21 22 23 24 25 26 27 28 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice