Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: thread medicine https://simplemedrx.top ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • Article (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 Next »

21%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
or combine it with a log analysis app for a comprehensive threat-monitoring system. Infos Osquery: http://osquery.io Available schemas: https://osquery.io/schema/3.3.2 Configuration options
21%
Incident Analysis with The Hive and Cortex
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Kurhan, 123RF.com
and respond to the threat in the event of damage. Threat intelligence analysis uses a variety of tools to help gather information and share insights. Various tools let you process security incidents
21%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
from the GitHub README: Mutillidae II boasts 40+ vulnerabilities and challenges. Each of the highly regarded OWASP Top 10 security threats are covered (all the threats are included from the 2007
21%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux prepares Windows for installing the subsystem (Figure 1, top). Next, select Settings | Update & Security | For developers to enable Developer mode
21%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
to interfere with the network traffic between Exchange and Office 365. This is especially true for businesses that use Microsoft Forefront Threat Management Gateway (TMG). You should generally enter the IP
21%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
, the field of network security is relatively wide and presupposes expertise in tasks such as creating VPCs and their subnets, routing, analyzing flow logs, setting up firewalls, and establishing threat
21%
Professional protection for small and mid-size enterprises
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Guido Vrola, 123RF.com
Linux, which is responsible for managing the network interface cards, routing, network configuration, and other basic services. On top of this operating system sits the Untangle VM, a Java VM within which
21%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
malware threats. Quite a few reasons speak to the use of exotic frameworks such as the Haskell-based Yesod [4] [5]. It is not just that Yesod is less widespread, it is also that the security built ... The Yesod web framework includes a Haskell compiler on top of the standard web technologies, such as HTML, JavaScript, and CSS, with aggressive optimization and function checks for correctness.
21%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
able to write to any file or directory from the top level of your main disk with this command, which mounts a volume using -v: $ docker run -v /:/tmp/container-filesystem chrisbinnie
21%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
Many different tools on the market help enterprise security teams monitor security-related log and network data, with a view to detecting and analyzing acute threats and attacks

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice