Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 58 Next »

32%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
images are also included in the dependencies that are necessary to build the container. The Makefile section in Listing 2 illustrates this. Listing 2 Managing Dependencies gentoo
32%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
today, including Snort [2] and AlienVault (OSSIM) [3]. Each has its strengths. Snort remains the premier signature-based IDS tool. OSSIM adopts a similar approach to Bro. I wouldn't include Ntop [4
32%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
Gone are the days when Hyper-V was trying to catch up with the basic functionality of VMware. After the release of Windows Server 2012 R2, Microsoft's hypervisor drew level with vSphere for most
32%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
will be followed this time, although test builds are now available online [2]. Jigsawing One core feature of Java 9 par excellence is the Java Platform Module System that became known as Project Jigsaw [3]. Thus
32%
Central logging for Kubernetes users
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © zlajo, 123RF.com
logging, aimed primarily at Kubernetes users who are already using Prometheus [2]. Loki claims to avoid much of the overhead that is a fixed part of ELK. In terms of functionality, the product can't keep
32%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
that allows interpretation. After preparing the data set appropriately, rules for intelligent software behavior can then be defined. In traditional machine learning, the user decides as early
32%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle
32%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
authentication. The sshd file is relatively readable and includes rules about locales and even Message Of The Day settings if you ever want to alter them. Innards of the Beast If you navigate to the /etc
32%
Archiving teams and channels
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Adis Corovic on Unsplash
option (Figure 2). Again, you need to set the SharePoint site to read-only. Figure 2: You can archive clients in the Teams contextual menu. Provided
32%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
, Google provided a solution to this dilemma with the MIT-licensed Brotli [2] software, which compresses files at the same speed as Gzip, but with a higher compression rate – as demonstrated (Listing 1

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice