Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (484)
  • Article (145)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 65 Next »

16%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
attached (Figure 12). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
16%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
://istio.io Vitess for MySQL: https://vitess.io/docs/archive/12.0/reference/compatibility/mysql-compatibility/ The Author Martin Loschwitz
16%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
implementation 11 provides de.lm.java9.modulea.CustomerService with de.lm.java9.modulea.intern.CustomerServiceImpl; 12 } All other classes from modulea are not visible outside of the module. Although
16%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
filesystem, a CD-ROM drive in Linux is usually a file called /dev/cdrom (actually, it's a symlink to /dev/sr0 for a SCSI drive), which streams data from your hardware to the system. For security reasons, when
16%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
. As an alternative to the hostname, you can also specify the IP address. For an address range, just specify the subnet: klaus 192.168.2.0/255.255.255.0=(ALL)NOPASSWD:/usr/bin/apt-get upgrade In this case, the user
16%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
Options.ListenAnyIP(4711, 08 listenOptions => { 09 listenOptions.UseHttps("cert.pfx", ""); 10 } 11 ); 12 }) 13 .UseStaticWebAssets() 14 .Use
16%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
: profile title: InSpec profile to check /etc/motd maintainer: Martin Gerhard Loschwitz copyright: Hutchison Drei Austria GmbH copyright_email: martin.loschwitz@drei.com license: Apache-2.0 summary: Tests
16%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
installing NxFilter: sudo service systemd-resolved stop sudo systemctl disable systemd-resolved.service sudo rm /etc/resolv.conf sudo echo 'nameserver 0.0.0.0' > /etc/resolv.conf NxFilter is also available
16%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
and developers alike. To access them, press F12. The tools display the source code for a page and help with error analysis (e.g., if a page takes a long time to load). The Network tab lets you check the loading
16%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 65 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice