Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (39)
  • Article (7)
  • News (5)
Keywords

« Previous 1 2 3 4 5 6 Next »

27%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
for the first time, it downloads the available block and reputation lists to the local system, which you can monitor easily in a terminal window. After launching the server, you can access Maltrail in the web
27%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
, and then select the previously downloaded file in step 3. After the upload, you can monitor the import progress in the output console. When done, select All issues again, and you will see the sample data
27%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
modules (HSMs) on Android devices, or Trusted Platform Modules on a laptop. The term "discoverable credential" is so called, because the client can determine a list of possible keys in the authenticator
27%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
.g., /var/log/auth.log  or /var/log/boot.log ) or performing other specific admin tasks – including debugging problems. Permissions The user account on my laptop allows me to write to but not read from syslog . You might
27%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
commissioning and continuous monitoring in production are essential to ensure that hyperthreading offers the benefits you expect. In contrast, vCPUs are an abstraction that enables a VM to use computing
27%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, they are not monitored, although this does not apply to the Windows Management Instrumentation (WMI) persistence rule. In the next phase, you will exit audit mode and activate the defined rules. If you identified rules
27%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
table attacks. This technique significantly improves the security of hashed data and should be used by default. Implement continuous monitoring and evaluation processes to ensure the effectiveness
27%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
to improve the situation with several specifications included in the OCP data center NVMe specifications. First is to define a health information log with SSD statistics (version 1.0) suitable for monitoring
27%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
stores the data there. That aside, the BadUSB function is easy to use. Starting at the Main Menu, choose Bad USB , select the payload script, connect the device to the laptop, and Run the script. Flipper
27%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
controllers are already suffering capacity problems. In this case, extended system monitoring can cause the DCs to respond more slowly, but if you are at this point, replacing the hardware is the order

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice