Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 108 Next »

12%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
of carefully monitoring such key system changes are clear, but you might rightly ask: "Why is this even more important in a containerized environment?" The reason is surprisingly simple. On a host running many
12%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
and operating a platform requires additional software, including operating tools – life-cycle management, monitoring, logging, auditing, metering, continuous integration (CI), etc. – and user and authorization
12%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
on the right side under the Images heading. Logstalgia can also continually monitor an access log, which turns the software into an attractive monitoring tool. If you run it in a different window, you can see
12%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
management systems. In firewall mode, only authorized queries are passed in to the database; GreenSQL responds to unauthorized queries with an empty result set. The commercial Activity Monitoring and Data
12%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
auditing and penetration testing. The dsniff suite includes tools such as dsniff, filesnarf, mailsnarf, nsgsnarf, urlsnard, and webspy, which passively monitor a network for interesting data. (Arpspoof
12%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
collections distribute RAs to local communication partners without any substantial manual effort. If these activities are not monitored, the rogue router establishes itself as the IPv6 default gateway
12%
Business continuity management
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Andrea Danti, 123RF.com
center? Moreover, how will the underlying network configuration, IP addresses, and DNS cope with this? Simplifications in the form of system monitoring and intelligence, in combination with automatic
12%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
, monitor, and update your devices directly on the Internet (also called over the air, or OTA). For executing device management operations in a consistent way across different hardware platforms, some
12%
Export and analyze Azure AD sign-in and audit logs
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
in the Monitoring section of the AAD portal. You will then see an overview of available workbooks. Microsoft has started to publish predefined reports as part of the engine changeover. Of course, you can leverage
12%
Microsoft PowerToys for Windows 10
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Kenney Badboy on Unsplash
layouts. Many monitor manufacturers offer such tools to allow the easy positioning of windows, especially when using large, wide-screen displays. The Shortcut Guide tool launches when you press the Windows

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice