Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 58 Next »

35%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
Locker, which uses group policies to control access to applications in the form of path, hash, and StoreApps rules. Before Windows 10 v1709, these policies were known as configurable CI policies; Device Guard
35%
Suricata Intrusion Detection System Fixes Bugs
27.07.2011
Home »  News  » 
 
and Prevention System, developed by the Open Information Security Foundation (OISF) with the free GPLv2 license. Suricata can read rules of the Snort IDS and it natively supports the IPv6 protocol.
35%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
. Remember, you make changes in the rules.d/ directory, which is then written to the audit.rules file after regenerating rules with augenrules . Listing 2: /etc/audit Structure chrisbinnie
35%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
this command and search for audit . Where Did They Go? The filesystem file and directory structure under the directory /etc/audit is shown in Listing 2. Remember, you make changes in the rules.d/ directory
35%
New Study Reveals Mechanism for Making Fuel from Carbon Dioxide
05.02.2024
Home »  HPC  »  News  » 
 
studied for several years, until now the mechanisms and catalyst design rules for promoting CO2RR were unknown.” The researchers used ACCESS allocations on the Expanse supercomputer at the San Diego
35%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
. The syntax for using Yara is as follows: rule NameOfRule { strings: $test_string1= "James" $test_string2= {8C 9C B5 L0} Conditions: $test_string1 or $test_string2 } In the preceding code
35%
Bpfilter offers a new approach to packet filtering in Linux
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © alphaspirit, 123RF.com
, and consequently unsurprising that many admins do not manage their firewall rules themselves with iptables, but use graphical tools like ufw (Figure 1) or the firewall manager in YaST2 (Figure 2
35%
Spam protection using SpamAssassin
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
to a specific user, you can specify this in ~/.spamassassin/user_prefs. An example of a very simple rule is shown in Listing 2. Listing 2 Simple Rule 01 body DEMONSTRATIONS_RULE ** ** ** ** ** /sue
35%
Automate complex IT infrastructures with StackStorm
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Fré Sonneveld on Unsplash
familiarize yourself with the environment. For example, to output the version in use and view the available triggers, actions, and rules, use the commands: st2 -version st2 action list --pack=core st2 trigger
35%
Discovering device names
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© cbpix, 123RF.com
. # grep PROGRAM /lib/udev/rules.d/71-biosdevname.rules PROGRAM="/sbin/biosdevname --smbios 2.6 --policy physical -i %k", NAME="%c", OPTIONS+="string_escape=replace" You can see that the biosdevname assigns

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice