Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: thread medicine https://simplemedrx.top ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (63)
  • Article (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

21%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
information systems and the data that is housed on those systems from a threat actor. The US currently requires DoD contractors to include Defense Federal Acquisition Regulation Supplement (DFARS) clause 252
21%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
or combine it with a log analysis app for a comprehensive threat-monitoring system. Infos Osquery: http://osquery.io Available schemas: https://osquery.io/schema/3.3.2 Configuration options
21%
Incident Analysis with The Hive and Cortex
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Kurhan, 123RF.com
and respond to the threat in the event of damage. Threat intelligence analysis uses a variety of tools to help gather information and share insights. Various tools let you process security incidents
21%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
from the GitHub README: Mutillidae II boasts 40+ vulnerabilities and challenges. Each of the highly regarded OWASP Top 10 security threats are covered (all the threats are included from the 2007
21%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux prepares Windows for installing the subsystem (Figure 1, top). Next, select Settings | Update & Security | For developers to enable Developer mode
21%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
to interfere with the network traffic between Exchange and Office 365. This is especially true for businesses that use Microsoft Forefront Threat Management Gateway (TMG). You should generally enter the IP
21%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
, the field of network security is relatively wide and presupposes expertise in tasks such as creating VPCs and their subnets, routing, analyzing flow logs, setting up firewalls, and establishing threat
20%
Professional protection for small and mid-size enterprises
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Guido Vrola, 123RF.com
Linux, which is responsible for managing the network interface cards, routing, network configuration, and other basic services. On top of this operating system sits the Untangle VM, a Java VM within which
20%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
malware threats. Quite a few reasons speak to the use of exotic frameworks such as the Haskell-based Yesod [4] [5]. It is not just that Yesod is less widespread, it is also that the security built ... The Yesod web framework includes a Haskell compiler on top of the standard web technologies, such as HTML, JavaScript, and CSS, with aggressive optimization and function checks for correctness.
20%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
able to write to any file or directory from the top level of your main disk with this command, which mounts a volume using -v: $ docker run -v /:/tmp/container-filesystem chrisbinnie

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice