Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (504)
  • Article (122)
  • News (59)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 Next »

12%
Managing access credentials
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Marcel Goldbach, photocase.com
store similar authentication data. To create the first folder, go to Edit | Add Folder . The parent folder appears in a window and expects a name to be entered in the Folder Name field. You can
12%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
. Toolkit CFEngine 3 does the usual work that you might expect from a configuration tool. It can obtain information about a target system and its state and modify text files in various formats. It can set
12%
Linux device mapper writecache
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © lightwise, 123R.com
.4 kibibytes per second (KiBps) throughput. Although that number is not great, it is expected when sending a number of small random writes to an HDD. Remember, with mechanical and movable components, a large
12%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
-certificate-data and client-key-data fields exist in the user context. They contain the Base64-encoded version of the certificate and private key, which the YAML configuration file expects in one line. If OpenSSL is used
12%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
AWS, as I live in the Seattle area, and you would pretty much expect me to pick a provider from the Northwest. The good news, is that Chef makes it easy to work with Amazon. Chef has images available
12%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
version management such as RVM, rbenv, or chruby. If you do use a version manager, you can expect hard-to-identify problems. Huginn comprises the web interface and a matching background service
12%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
, it might SELECT * – that is, display everything in the database table that's called accounts . To test this, go back to an empty login screen and enter the password ' OR 1='1 with no username. Expect
12%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
logs are also vital for any analyst, if you really want to get into what's happening on the network, Wireshark is terrific. Once again, you can't simply expect an IDS such as Snort, Bro, Solar
12%
A storage engine for every use case
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Maikloff, Fotolia.com
MySQL expects storage engines to implement functions, accept certain parameters, and return a result that it is able to understand; otherwise, they have a high degree of freedom. For example, when My
12%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
: If you make a mistake, just go into the AWS Console and check Disable GuardDuty to prevent ongoing charges. Mein Gott! You are finally up and running, and you can expect AWS to start monitoring your

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice