Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: viral ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (113)
  • News (30)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 73 Next »

16%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
. The script worked without errors with Python v2.7.14, which was installed by default on the system. The developer explicitly points out that this script can only offer all of its feature set if the following
16%
News for Admins
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
 
Google Announces Kubernetes 1.0 Google has announced the Kubernetes container orchestration system has reached the v1.0 milestone. Kubernetes runs within a "Google-style infrastructure stack
16%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
for a desktop system, which explains why protection profiles are different. The Protection Profile for general-purpose operating systems [2] clearly stipulates that user sessions must either be terminated or
16%
Encrypting DNS traffic on Linux with DoT
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Alexander Grey on Unsplash
web browsers, as well as Windows 11, and a number of public DNS servers also speak this protocol [2]. DNS over TLS (DoT) was standardized two years earlier in RFC 7858 [3]. As the name suggests
16%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
If you want to search for specific strings in code or files, you can turn to a number of powerful Unix tools for the command line, such as Ack [1] and Grep [2]. Both use regular expressions
16%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
.g., different filter rules can be implemented in different departments). Blocky supports the DNS over HTTPS (DoH) protocol described by RFC 8484 [2], which was published three years ago. The idea behind Do
16%
Manage Linux containers with Docker
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © 36clicks, 123RF.com
a recent kernel [2]. Docker promises to enable "run anywhere" deployments for a wide class of applications that have previously been very hard to package and maintain. Container Ship For example, a typical
16%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
community [1]. The overall set of IBM Power collections provide modules that can be used to manage IBM Power servers; collections are also available for IBM VIOS, HMC, IBM i, and Linux on Power [2]. A full
16%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
itself. Installation steps vary, depending on your operating system [2]. Once Docker is installed, open a terminal and execute the following command to confirm Docker is correctly installed: docker
16%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
the context of the organization" [2] may be familiar to many people from their own business experience. SOC2 C5 [3] from the German Federal Office for Information Security (BSI) also demonstrates fundamental

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 73 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice