Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (505)
  • Article (164)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 72 Next »

15%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
be created that prevents the execution of arbitrary code, even if an attacker is working as root on the system. The Foundries stack scores bonus points because it can also natively use the cryptographic
15%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
back. How is an admin or developer, for which an active cloud-ready application already looks like the proverbial black box, supposed to find the root of the trouble now? Conventional Means Will Fail
15%
Managing Active Directory sites and subnets
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Allan Swart, 123RF.com
like this will usually help you identify quickly which DC is the root cause of the problem. Then, you can take a closer look at it and check whether it is working within its site. The next step
15%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
as root, be careful. For example, to run the EP benchmark use: time mpirun -np 6 -h ./hostfile ep.B.x The output could be written to a random file in /tmp and parsed for the runtime. The benchmark time
15%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
again and run so-allow as root. Select analyst access and enter the IP address of your computer. Quick Access to Tools The web interface gives you direct access to your own functions from the menu
15%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
also assign your passwords to groups to help you find them faster. The Root context menu is used to create new password groups, and you can select Icon to assign a separate icon for each group in Kee
15%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
significantly more functionality. Pluton acts as a hardware root of trust and random number generator, securing the MCU with Secure Boot and implementing encryption functions. The chip makes sure a device does
15%
Manage Windows Server storage with PowerShell
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Brian McGowan on Unsplash
the -PassThru switch, which you can use to pipe the results of the repair. If the repair fails, you need to continue digging down to find the root cause. Storage Spaces offer a variety of other features
15%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Jack Hunter on Unsplash
will find the root filesystems of all your installed distributions in subfolders of the \\wsl$ virtual network share. If you need graphical tools that do not exist as native applications for Windows
15%
Harden your Apache web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
the previous Order/Allow/Deny syntax. Without explicit configuration, the Directory directive allows access to the entire root filesystem, which can be prevented by the configuration shown in Listing 1

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 72 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice