Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 34 Next »

33%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
a home network. The fasttrack rule (no. 8) is a clever trick that makes packets from established connections bypass the firewall to reduce the CPU load. As an example of what the RouterOS firewall
33%
Creating Virtual SSDs
21.01.2020
Home »  HPC  »  Articles  » 
    7        1      56008 loop1 06    7        2      56184 loop2 07    7        3      91264 loop3 08  259        0  244198584 nvme0n1 09    8        0  488386584 sda 10    8        1       1024 sda1 11    8
33%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
, the malicious code is executed. A YARA rule that detects this process can be found in a GitHub repository [6] (Listing 1). The YARA rule can identify and classify malware. Listing 1 YARA Rule Rule
33%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
scan --verbose command starts an extensive scan that checks the target instance of K8s for all the rules it contains. As described, this includes MITRE and NSA frameworks, as well as some rules from
33%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
, or at most three, nodes. The possibility of adding more nodes is ruled out from the beginning. With RADOS, theoretically, any number of nodes could be added to the cluster, and for each one, the object store
33%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
Observium, it has no annual license fees for additional features or services such as quick updates, rule-based grouping, and scalability across multiple servers. Monitoring with LibreNMS is easier now thanks
33%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
with the label 10 . Now, check that traffic is hitting the rules, or chains, created by checking the mangle table (Listing 8). Listing 8 Checking the Mangle Table $ iptables -t mangle -nvL Chain
33%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
of the following three steps: Creating the Phase 1 definition Creating the Phase 2 definition Creating a firewall rule that permits traffic on the VPN Figure 8 shows the definition of Phase 1
33%
Certificate management with FreeIPA and Dogtag
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Oscar Sutton on Unsplash
, just as admins run AD on Windows networks. Installing the FreeIPA Server To set up the IPA server, you will want to use a Linux distribution such as Enterprise Linux distribution version 8 (EL8), Rocky
33%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
"SetAllowTSConnections" -Arguments @{AllowTSConnections=1;ModifyFirewallException=1} The command also sets up the required firewall rules to prevent Windows firewall blocking access. Group Policies

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice