Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 58 Next »

34%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
the connection when left to their own devices, but only in combination with other events. Scores and check rules can be configured and extended freely. Listing 2 shows an example of a Naxsi control set. Rule 1
34%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
is required to create a rule (Figure 2): The firewall rule Name should be as descriptive as possible, and policies should be created by use case and not be too specific about individual ports or IP
34%
Altair Updates Compute Manager
04.10.2012
Home »  HPC  »  News  » 
 
of animation and plot data for both running and completed jobs; and a centralized configuration system for defining users and their groups. Compute Manager 11.1 also offers built-in 3D and 2D visualization
34%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
as authorization entries. Listing 2 shows a rule that lets user klaus change the global network settings in Network Manager. Listing 2: Rules for LocalAuthority [Klaus is allowed to modify network settings
34%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
34%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
default via 10.2.2.1 ip rule add from 172.16.0.0/24 lookup 8 Administrators need to be aware of one small thing when using multiple routing tables: You do not have the routing entries the kernel creates
34%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
because access tokens in the OAuth 2.0 standard are usually only valid for one hour, after which you need to obtain a new token, which involves an in-depth reappraisal of the access context. At the end
34%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
overview of the DLP policy templates online [2]. Table 1 Purview DLP Templates Templates Integrated in Purview Description France: Data Protection Act Information
34%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
on Windows 2008. The next step is to create a Connection Security Rule. Endpoint 1 will always be the LAN where the Windows Server resides, and endpoint 2 will be the LAN at the other end. The gateway IP
34%
Time Protocol Threat Could Allow Login with Expired Passwords
28.10.2015
Home »  News  » 
 
or certificates. Attackers could also cover their tracks or manipulate banking transactions by surreptitiously altering timestamps. Users are advised to upgrade to ntp-4.2.8p4, which fixes this vulnerability

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice