Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 58 Next »

34%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
if the people responsible for IT observe several important basic rules when designing the SIEM system and the sensor architecture. In this article, we introduce readers to the fundamental points to be considered
34%
IPFire Improves Its Intrusion Prevention System
16.06.2022
Home »  News  » 
 
IPFire 2.27 Core Update 168 has arrived and adds improvements to the Intrusion Prevention System by allowing users to enable the monitoring mode for each ruleset provided (making baselining
33%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
). If you like, you can save just this one policy. Figure 2: Before comparing the existing rules with those of the baselines, it makes sense to make a backup
33%
OpenFlow and the Floodlight OpenFlow Controller
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © aurielaki, 123RF.com
. These flows are assigned a priority and an action. A simple OpenFlow rule looks like this: match="dl_type=ip, nw_type=tcp,tp_dst_port=80", action="output=2",priority="10" This rule states that all IP packets
33%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
*/ condition: filesize < 1KB and 2 of them } With the Velociraptor framework, we executed this YARA rule on all connected workstations, which can take place continuously and in parallel. To do this
33%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
in the selection menu. In the dynamic configuration, regular expressions such as equal , not equal , and the like are also used to select devices. Figure 2: The Rule
33%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
. These flows are assigned a priority and an action. A simple OpenFlow rule looks like this: match="dl_type=ip, nw_type=tcp,tp_dst_port=80", action="output=2",priority="10" This rule states that all IP packets
33%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
systemd. The rule_dns.yml rulebook starts with the Kafka source: - name: Kafka Monitor hosts: all sources: - name: Kafka ansible.eda.kafka: host: 192.168.2.12 port: 9092
33%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
33%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
-facing interface is ether1 and that you have a DNS server in your LAN at address 192.168.1.2. The first rule masquerades by NAT any traffic going from the LAN machines to the Internet. The second rule makes it so

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice