Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 70 Next »

6%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
of marketing? Clair If you are looking for an old hand in the container security circus, Clair [1] is certainly a candidate (Figure 1). Clair is not an independent software component but part of the Quay ... Vulnerable software and incorrect settings cause problems, but administrators have some tools at hand that can help with container security.
6%
Export and analyze Azure AD sign-in and audit logs
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
or changed group owners: AuditLogs | where TargetResources contains "a0fdc91a-a1b2-4ec5-b352-03bda610be0e" | where TimeGenerated > ago(7d) If you are looking for all operations that have to do
6%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
GVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC51aWQiOiJiNDVhMDhjMi1kMzg1LTQxMmItOTUwNS02YmRmODdiNjRhN2EiLCJzdWIiOiJzeXN0ZW06c2VydmljZWFjY291bnQ6ZGVmYXVsdDp0ZXN0c2VydmljZWFjY291bnQifQ.SO9XwM3zgiW6sOfEaJx1P6
6%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
and use CALs for user licensing, which is the easiest approach in most cases. In this special case, CALs for servers with Windows Server 2012 are also valid for Windows Server 2012 R2, as well as Remote
6%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
 for brevity]            8   10.59 so-4-2-0.mpr3.pao1.us.above.net (64.125.28.142)            9   11.00 metro0.sv.svcolo.com (208.185.168.173)            10  9.93  scanme.nmap.org (64.13.134.52)            Nmap
6%
Monitoring and service discovery with Consul
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Joshua Earle on Unsplash
. Case 2: Connecting with Prometheus One advantage of the described monitoring solution with Consul alone is that it manages without bloated monitoring systems like Icinga or Prometheus. On the other hand
6%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
and low resource usage (e.g., Kubernetes logging or Internet of Things devices). On the other hand, Fluentd, with its richer set of plugins, is often used in more complex log aggregation setups, where data
6%
Countering embedded malware attacks
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Daniela Mangiuca, 123RF.com
. Figure 1: Macros should be turned off in Office in all situations. Dridex Dridex, which is known banking trojan malware, has recently used a new attack vector. The trojan is used to steal money from
6%
LDAP integration with popular groupware suites
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Sergey Tryapitsyn, 123RF.com
of the attributes of both partners is required when merging your groupware system with an existing LDAP installation. Different groupware systems handle the situation differently. Tine 2.0 stores the IDs of its users
6%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
. For example, assume a user has an application hanging on a node. One of the first things I want to check is the load on the node (i.e., whether it’s very high or very low). Rather than repeatedly typing uptime

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice