Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1167)
  • Article (116)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 140 Next »

37%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
systems. Listing 1 Load Balancer Configuration 01 upstream backend { 02 backend1.example.com server weight = 5; 03 server backend2.example.com max_fails fail_timeout = 10s = 5; 04
37%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
_rewrite , where it has been used to create aesthetically pleasing (and as a result, search engine-friendly) URLs so that, for example, a URL such as domainname.com/directory-name/filename.html might become simply
37%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
sound an alarm is not helpful. Enter TICK Stack Kapacitor [5] (Figure 2), the InfluxDB watchdog that can generate alarms according to defined parameters and then pass to various alerting frameworks
37%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
: https://devblogs.microsoft.com/dotnet/introducing-net-5/ Install .NET Core on Linux: https://docs.microsoft.com/en-us/dotnet/core/install/linux Kestrel Server Options: https://docs.microsoft.com/en
37%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
Policy Version In this scenario, an attacker finds valid credentials on a pastebin data-sharing website and is able to access the cloud environment [5]. It turns out that the compromised user has
37%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
runs on 64-bit operating systems, requiring systemd along with KVM and Qemu version 5.2 or newer for virtualization. It needs at least 4GB of RAM, and the developers recommend KDE Plasma, Gnome, or Mate
37%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
) as their on-demand EC2 (Amazon Elastic Compute Cloud) service combined with their super-reliable S3 storage service (Amazon Simple Storage) to fulfill the meteoric growth of their online retail shop, Amazon.com
37%
Securing containers with Anchore
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © loiic, Fotolia.com
-engine container's hash and using it to change the hash beginning ab48a in the following command, which came directly from the Anchore GitHub page [5], $ docker exec -t -i ab48a716916f curl -u admin: http
37%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
tools is used, including JAX-RS [4] and Node.js [5]. In any case, two tools then access the API description and produce a complete API reference, as well as a matching SDK. The developer integrates
37%
Countering embedded malware attacks
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Daniela Mangiuca, 123RF.com
was hosted on a legitimate website, pastebin.com, a free web application that allows you to store and share text (including source code) with others for a set time period. Typically, these services

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 140 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice