Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1130)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 158 Next »

13%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
. Modern ransomware and the behavior of the groups behind it have adapted to this kind of reasoning and the technology behind it. Today, malware is installed well ahead of the attack. The overhead required
13%
OpenCanary attack detection
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
a corporate network, they will pursue different goals, starting with persistent login options on the computer to which they already have access. Maybe they will install a reverse shell, a customized remote
13%
Multifactor authentication with Google Authenticator
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © iofoto, Fotolia.com
of password or passphrase theft, and Google Authenticator provides a PAM module that can be integrated easily into SSH authentication. The PAM module installs easily on the SSH server by using the package
13%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
how to install and use Hiawatha. You'll get the most benefit from Hiawatha if you run web applications, such as a CMS or any PHP website that occasionally gets hit by vulnerabilities (and they all do
13%
Warewulf 4
13.12.2022
Home »  HPC  »  Articles  » 
cover how to configure a head node and boot stateless compute nodes for a simple configuration. Configuration The physical configuration I used to illustrate the installation of Warewulf was very simple
13%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
_DS2_v2) and disk size (e.g., a 47GB OS disk). The source image details, such as offer, publisher, sku, and version, are also specified. Additionally, the template includes steps to install software
13%
MPI Apps with Singularity and Docker
18.03.2020
Home »  HPC  »  Articles  » 
is based), was downloaded. For Singularity, the latest version as of the writing of this article, 3.5.3, was built and installed. It uses Go 1.13, which was installed from binaries on the golang website
13%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
]. SD card writer [6]-[8], or buy a MicroSD card with the operating system already installed [9]. The Rasp Pi Model B+ needs a 5V Micro USB power supply, but not just any USB cable will do
13%
Setting up DevOps Orchestration Platform
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © J¸rgen Acker, Photocase.com
of various applications for installation on the deployed or imported infrastructure. Many sample Ansible playbooks have already been provided, forming a basis on which to extend the framework. A Docker module
13%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
log events (captured by Fluentd or Fluent Bit) to facilitate in-depth troubleshooting. Installation Before beginning the installation process, it's important to ensure that your system meets

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice