Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: thread medicine https://simplemedrx.top ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (62)
  • Article (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

20%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
containers start quicker, they contain fewer security threats and bugs, they take up less storage, and they take less time to download and upgrade. In other words, it's a really good idea to keep your
20%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
for years as a component of other open source projects, such as pfSense [4], into which FRR can now also be integrated. But Quagga is also used as the routing stack of Sophos's unified threat management
20%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
Companies spend huge amounts of money on preventing threats and ensuring data confidentiality caused by home office and distributed working practices. Microsoft has also identified this market and
20%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
on the application, protection against attacks on the host system is of no help at all. As usual in the security context, it turns out that the statement "X is more secure than Y" primarily depends on the threat
20%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
In the past, network attackers were much like purse grabbers or "smash and grab" muggers: They would find something they wanted, grab the goods, and run. Today's Advance Persistent Threats (APT
20%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
; however, software comes with limitations. Most users can live with these limitations, but if you are exceptionally conscious of your privacy or handle top secret data, you do not want to take any chances
20%
Can Your Server Be Toppled with a Single Command?
01.10.2011
Home »  Articles  » 
 
-edge application. Let's not fail to mention the weeks of work that your top-dollar designers have tirelessly put in so they can break the mold and produce a ground-breaking website. You think that your job's done
20%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
depends on your threat model. Most non-experimental filesystems are fairly robust in handling anything thrown at them during usage. However, one area that definitely needs improvement is handling
20%
Can your web server be toppled with a single command?
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Almagami, 123RF.com
cutting-edge application – not to mention the weeks of work your top-dollar designers have tirelessly put in so they can break the mold and produce a ground-breaking website. You think your job's done
20%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
easily search for it by typing the name or part of it, without wildcards, in the search bar at the top of the screen. The results appear in the main window, and from this list you can select an element

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice