Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 133 Next »

16%
Managing Active Directory sites and subnets
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Allan Swart, 123RF.com
in the snap-in and selecting New Site from the context menu. In PowerShell, use the New-ADReplicationSite command. At this point, no extensive configuration is required for the time being, and if you
16%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
identifier confirming membership of a Layer 2 segment. VLANs are assigned to VNIs on respective VXLAN tunnel end points (VTEPs). VTEPs can be implemented both on a hypervisor (i.e., the virtualization layer
16%
MinIO: Amazon S3 competition
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © zelfit, 123RF.com
as WORM storage. If so desired, all functions that enable write operations can be deactivated in the MinIO API. However, don't wax overly euphoric at this point – many authorities also require that systems
16%
Proxmox virtualization manager
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image by Daniela Cuevas on Unsplash.com
tools. The Proxmox API The most important of these tools is the API, which goes by the slightly clumsy name pvedaemon in the Proxmox universe. It forms the central switching point in the entire setup
16%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
configure native IPv6 addresses and tunnel addresses. This particularly becomes a danger if an admin has no plans to receive IPv6 traffic at this point in time and, thus, has no IPv6-specific security
16%
High availability with Oracle Standard Edition
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © aquir, 123RF.com
or Dell, Dbvisit has become a talking point of late with its standby product. Additionally, Dbvisit has developed its own replication solution in the form of Replicate. This tool presents an alternative
16%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
MAINTAINER Yves Schumann 03 04 ENV WORK_DIR=/data/work \ 05 DEBIAN_FRONTEND=noninteractive \ 06 LC_ALL=en_US.UTF-8 07 08 # Mount point for development workspace 09 RUN mkdir -p
16%
Setting up and managing IPv6 on Windows Server 2016
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Photo by mathyas kurmann Unsplash.com
been deactivated. This point is very important for internal name resolution on an Active Directory (AD) network. Under the DNS tab, you can also use Append these DNS suffixes (in order) to configure
16%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
be problematic, are highlighted in yellow in the middle of the list. Less important entries follow at the end. Kubescape also applies a point system, awarding points for each problem it finds. If an installation
16%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
's feature set by individual techniques. The starting point is the first phase of the attack, Tactics | Initial Access . The Sandworm group uses the T0865 Spearphishing technique with the help of the S0089

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice