Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 58 Next »

32%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
(guidelines, firewall rules, and access groups; e.g., the Microsoft tiering model [1]) in your infrastructure or simply apply common sense and good account hygiene in your daily administration, every
32%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
storage medium as read-only, which rules out any manipulation of storage devices that need to be forensically investigated. Kali Linux boots to an inconspicuous Gnome desktop (Figure 1) that reveals
32%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
, in an interview with the author. IT professionals describe themselves as DevOps specialists with increasing frequency, and some companies even have DevOps departments. The "2014 State of DevOps Report" [2
32%
Serverless applications with OpenFaaS
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kier in Sight Archives on Unsplash
) [2], autoscaling is handled by Prometheus and AlertManager. The gateway and function pods expose metrics (e.g., request rates). AlertManager is configured with rules that trigger when the requests per
32%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
– and a strong password. 2. Create firewall rules that only open what you required on both your servers and your network firewall. 3. Set up automated updates. Obviously, there is no such thing as a secure
32%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
by the not-for-profit organization called Open Web Application Security Project, or OWASP [2]. The ZAP security testing framework is regularly visible near the top of security tool review lists, thanks to its
32%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
). Teleport is officially certified under the HIPAA rules. But in Europe, certification according to the rules of the System and Organization Controls (SOC) 2 guideline is available and likely far more
32%
Policy-based DNS in Windows Server 2016
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © mikiel, 123RF.com
.contoso.com with the respective IP address to each zone scope (Listing 2). To establish the location dependency, you will be defining three DNS policies that must be rolled out individually on each server (Listing 3). Listing
32%
Four rescue systems compared
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Stephen Coburn, fotolia.com
or, in the case of Knoppix, a DVD. However, the rules of the game have changed in recent years: Five years ago, it was quite common for servers to be delivered with CD drives, but you often search
32%
OS10 and Dell's open networking offensive
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Pei Ling Hoo, 123RF.com
. Linux-only admins are usually already ruled out of the network hardware game for the same reasons. Switches thus integrate poorly with modern DevOps concepts: Companies typically maintain configurations

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice