Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 133 Next »

16%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
. Consul Delivers To avoid misunderstandings arising at this point, note that key-value stores should not be seen as a universal replacement for relational databases or as a drop-in replacement to enable
16%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
and that you can view the publisher at this point. If this is not desired, you can use group policy to control the behavior. Look for the Specify SHA1 thumbprints of certificates representing trusted .rdp
16%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
so, for a combination of open source software with extension modules and commercial support. Starting Point The backup software originally used was IBM's Tivoli Storage Manager [3]. However, a review
16%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
that everyone else gets. Spacelift gives you virtually no alternative to hyperscalers and none at all to AWS. Terminology If Spacelift presents nothing fundamentally wrong from your point of view, the next step
16%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
-premises services after destruction or compromise has a long history. For many applications – including AD – specialist tools let you restore up to a relatively recent point in time without the risk of reactivating
16%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
agent. Although the agents usually run in the system context on the respective servers, some applications, such as SQL, SharePoint, or Exchange, need more to retrieve application-specific status
16%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
.gz tar -zxvf pcre2-10.40.tar.gz -C src/external/ No errors should appear in the build process at this point. After starting the installation script, the next step is to select the language in which you
16%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
dismissed. An attack on an application running in a container causes fewer problems from the administrator's point of view, but planners and administrators would do well not to check the container security
16%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
allow remote maintenance if they actively confirm the connection request. The client expressly points out that unattended access only works in conjunction with X11. The Android app cannot be used
16%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
stands slightly apart from the other three solutions and has nothing to do with authenticating the sender; rather, it enforces the use of an SSL-encrypted connection from the sender's point of view

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice