Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: thread medicine https://simplemedrx.top ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • Article (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 Next »

21%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
-evolving threat landscape." A Ballet of Swans The long journey AWS has taken since around 2006 is of constant innovation. And to think, much of this innovation began with virtual machines (the Xen hypervisor
21%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
credibly checked for a compliant configuration. Up-to-date threat information for endpoints is added by Microsoft Defender for Endpoint. Figure 1: A sample
21%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
becoming the focus of those responsible for IT security as the threat situation continues to worsen. If you want to monitor tier 0, the increasingly powerful monitoring systems themselves become tier 0
21%
Secure microservices with centralized zero trust
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Christopher Ruel on Unsplash
– such as Unable to connect to https://database.service.local – expired TLS certificate – and smacked your head in frustration at how such a preventable failure mode brought down your carefully crafted
21%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
://www.microsoft.com/en-us/download/details.aspx?id=104005 Security Compliance Toolkit: https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10 BSI SiSyPHuS: https
21%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
resource requirements. Although Apache is still king of the hill, approximately 30 percent of the top 10,000 websites already benefit from Nginx [2] (Figure 1
21%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
(OWASP) top 10 threats. This integration ensures that your Linux web services are not only performant but also secure from common attack vectors. Traffic Routing Azure Traffic Manager is a global DNS
21%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
on top of a classic "allow/deny" policy. True to the motto, "You can't protect what you can't see," increasing visibility on the network and identifying, reporting, and dealing with potential threats
21%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
containers start quicker, they contain fewer security threats and bugs, they take up less storage, and they take less time to download and upgrade. In other words, it's a really good idea to keep your
20%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
for years as a component of other open source projects, such as pfSense [4], into which FRR can now also be integrated. But Quagga is also used as the routing stack of Sophos's unified threat management

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice