Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (464)
  • Article (135)
  • News (10)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 Next »

13%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
grants permissions to enable GuardDuty. If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems
13%
WordPress, Joomla, and Drupal compared
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Zoya Fedorova, 123RF.com
not be suitable for your website. Open source competitors such as Joomla [3] and Drupal [4] attract users with interesting and unique selling points. If you want to set up a website for a new product
13%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
and supplies (e.g., eBay/PayPal's GO 3 token, known as a "security key"). At the heart of two-factor authentication is the Identikey server, which – in the basic version – comprises a RADIUS interface
13%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
, download the appropriate package from the project page [3]. The selection menu lets you switch to different application categories. In addition to the ISO and VM images, you will find packages for other
13%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
. One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established
13%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
the context of the organization" [2] may be familiar to many people from their own business experience. SOC2 C5 [3] from the German Federal Office for Information Security (BSI) also demonstrates fundamental
13%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
13%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
so, for a combination of open source software with extension modules and commercial support. Starting Point The backup software originally used was IBM's Tivoli Storage Manager [3]. However, a review
13%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
on the GitHub platform [2] under the GNU Affero General Public License version 3 (AGPLv3). In this article, I look at the free version's basic feature set. Relay Servers Depending on the operating system
13%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
the Institute of Compute Technology (ICT) at the Chinese Academy of Sciences will present the latest development called the Godson-3B [3]. This processor has eight cores running at 1.35GHz, reaching a theoretical

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice