Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (590)
  • Article (186)
  • News (70)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 85 Next »

48%
Acorn facilitates the deployment of apps in Kubernetes
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Önder Örtel on Unsplash
The same is true for rolling out apps in Kubernetes itself: Anyone who has had the pleasure of dealing with custom resource definitions (CRDs), third-party operators, and Kubernetes' various storage
48%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
Data Security Onion comes with five tools for collecting network data and for initial analysis: Stenographer, Suricata, Zeek, Strelka, and OpenCanary. Google developed Stenographer for bulk logging
48%
Containers made simple
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Nathan Cima on Unsplash
readers will of course wonder what's happening with Kubernetes, Google's container orchestrator. It is now more or less used as a synonym for container, although the two terms are by no means the same
48%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
entire networks or hosts and search for specific vulnerabilities. Google comes to the aid with its Tsunami [1] offering. Because it is not an official project, Google does not provide any support ... Google Tsunami security scanner detects errors that typically signal danger and outputs alerts. We look into how you can get the tool up and running and even write the required plugins yourself. ... Google Tsunami ... Discover vulnerabilities with Google Tsunami
48%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
to create a new customer account, or tenant, with Azure Sphere Security Service and to register the device. In the case of the development board in this example, however, I first had to reinstall (recover
48%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
Kubernetes is one of the most dazzling attractions in the current circus of IT tools. Once developed by Google, it is now under the aegis of the Cloud Native Computing Foundation (CNCF) and has
48%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
, and processes. When combined, they built best practices for the protection of an organization and associated federal contract information and CUI. CMMC 1.0 had five cybersecurity maturity levels (1
48%
Alternative virtualization solutions when OpenStack is too much
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © elnur, 123RF.com
cloud functionality, automation, and self-service. OpenStack has never been able to live up to this claim, if only because many large telcos and other companies had a say in the fate of the project
48%
Samba domain controller in a heterogeneous environment
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Zachary Nelson on Unsplash
deploys Windows 10 Enterprise and Windows Server 2022. Windows 10 Enterprise version 21H2 does not have the Join a domain button that previous Windows versions had in system Settings. You need to work your
48%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
by the SID converter. You have probably viewed the event log of a domain controller that revealed a problem with a user that had a SID of 123 et cetera , but who is this user? Of course, you have Power

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice