Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: thread medicine https://simplemedrx.top ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • Article (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6

20%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
Companies spend huge amounts of money on preventing threats and ensuring data confidentiality caused by home office and distributed working practices. Microsoft has also identified this market and
20%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
In the past, network attackers were much like purse grabbers or "smash and grab" muggers: They would find something they wanted, grab the goods, and run. Today's Advance Persistent Threats (APT
20%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
on the application, protection against attacks on the host system is of no help at all. As usual in the security context, it turns out that the statement "X is more secure than Y" primarily depends on the threat
20%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
; however, software comes with limitations. Most users can live with these limitations, but if you are exceptionally conscious of your privacy or handle top secret data, you do not want to take any chances
20%
Can Your Server Be Toppled with a Single Command?
01.10.2011
Home »  Articles  » 
 
-edge application. Let's not fail to mention the weeks of work that your top-dollar designers have tirelessly put in so they can break the mold and produce a ground-breaking website. You think that your job's done
20%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
easily search for it by typing the name or part of it, without wildcards, in the search bar at the top of the screen. The results appear in the main window, and from this list you can select an element
20%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
top 10, top 20, or even top 30 lists of the best root apps. We gained a positive impression of tools such as Android Tuner, Cron Tasker, Adblock Plus, zAnti, or the WiFi inspection tool and PCAP sniffer
20%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
systems against today’s evolving cyber threats.” What does this mean for the trusty Kubernetes Auto Analyzer? The good news is that when reports are generated to fill in the blanks about your Kubernetes
20%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
and similar systematic security threats. I think systemd can and should play a certain role in making generic distributions more secure: more TPM2, meaningful secure boot, more sandboxing, more encryption, more

« Previous 1 2 3 4 5 6

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice