Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (442)
  • Article (129)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Next »

18%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
/24, \ 1.2.3.4/32, 21.21.21.0/19 IP addresses hosts.allow can be set to accept connections from hostnames, too. One example might be ALL: *.domain.tld or you might have an administrative group
18%
Automate Active Directory management with the Python PyAD library
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Eric Issele, 123RF.com
in the following, but watch out: As part of the initial execution, Pip offers to update from version 22.3.1 to 23.1.2 (Figure 1). Do not agree to this request under any circumstances if you want to use PyAD, because
17%
Harden your Apache web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
have been using Apache for many years, it is best to take a look at the changes in version 2.4 [3], which include the new mod_authz_host access module with the Require directive, which replaces
17%
Storage Spaces Direct with different storage media
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Twwx, photocase.com
, the function can be activated in PowerShell: Enable-ClusterStorageSpacesDirect As part of the setup, you can enter > Test-Cluster -Node 3,Node4> -Include "Storage Spaces Direct
17%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
are not defenseless: The Enhanced Mitigation Experience Toolkit (EMET) has had a function similar to pinning since version 4.0 [3]. Until recently, the server was basically defenseless against these attacks. All data
17%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
=FreshRSS feed aggregator 03 04 [Container] 05 Image=docker.io/freshrss/freshrss:1.25.0 06 ContainerName=freshrss 07 HostName=freshrss 08 Volume=%h/containers/freshrss/data:/var/www/FreshRSS/data:Z 09 Volume=%h
17%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
of many automated attack methods. As well as being able to take individual IP addresses, hosts.allow can happily handle the CIDR notation of classless IP address ranges, such as: sshd: 10.10.10.0/24, 1.2.3
17%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
and criticized the payment of ransom across society [3]. Although many insurance companies will pay the ransom today, some providers have already explicitly ruled out payment. Of course, criminals are also
17%
Automatic build and deploy with OpenShift and GitLab CI
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Photo by Jantine Doornbos on Unsplash
-app . --name=$APP" 20 # create a new application from the image in the OpenShift registry 21 - "oc start-build $APP --from-dir=. --follow || sleep 3s" 22 # start a new build 23 - "oc get routes $APP
17%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
from systems such as the IIS, Microsoft Exchange ActiveSync, Exchange Web Services (EWS), or Outlook Web Access (OWA). Installation under .NET .NET Framework 4.x and Log Parser 2.2 [2] form the basis

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice