Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (583)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 71 Next »

6%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
(EUM), end-user experience monitoring (EUXM), app monitoring, application performance management (APM), and chain monitoring. In each case, though, the terms only refer to one aspect of E2E monitoring
6%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
appropriately. In these cases, cooperation with service providers proves useful, because they can draw on expertise. Whether this takes the form of an MSSP approach, a SOCaaS offering, or simply MDR for the more
6%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
of marketing? Clair If you are looking for an old hand in the container security circus, Clair [1] is certainly a candidate (Figure 1). Clair is not an independent software component but part of the Quay ... Vulnerable software and incorrect settings cause problems, but administrators have some tools at hand that can help with container security.
6%
Export and analyze Azure AD sign-in and audit logs
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
or changed group owners: AuditLogs | where TargetResources contains "a0fdc91a-a1b2-4ec5-b352-03bda610be0e" | where TimeGenerated > ago(7d) If you are looking for all operations that have to do
6%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
GVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC51aWQiOiJiNDVhMDhjMi1kMzg1LTQxMmItOTUwNS02YmRmODdiNjRhN2EiLCJzdWIiOiJzeXN0ZW06c2VydmljZWFjY291bnQ6ZGVmYXVsdDp0ZXN0c2VydmljZWFjY291bnQifQ.SO9XwM3zgiW6sOfEaJx1P6
6%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
and use CALs for user licensing, which is the easiest approach in most cases. In this special case, CALs for servers with Windows Server 2012 are also valid for Windows Server 2012 R2, as well as Remote
6%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
 for brevity]            8   10.59 so-4-2-0.mpr3.pao1.us.above.net (64.125.28.142)            9   11.00 metro0.sv.svcolo.com (208.185.168.173)            10  9.93  scanme.nmap.org (64.13.134.52)            Nmap
6%
Monitoring and service discovery with Consul
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Joshua Earle on Unsplash
. Case 2: Connecting with Prometheus One advantage of the described monitoring solution with Consul alone is that it manages without bloated monitoring systems like Icinga or Prometheus. On the other hand
6%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
and low resource usage (e.g., Kubernetes logging or Internet of Things devices). On the other hand, Fluentd, with its richer set of plugins, is often used in more complex log aggregation setups, where data
6%
Countering embedded malware attacks
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Daniela Mangiuca, 123RF.com
. Figure 1: Macros should be turned off in Office in all situations. Dridex Dridex, which is known banking trojan malware, has recently used a new attack vector. The trojan is used to steal money from

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice