Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 149 Next »

13%
Response automation with Shuffle
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Kenneth Berrios Alvarez on Unsplash
). Shuffle fetches the input from your monitoring tools (e.g., an intrusion detection system) and passes this input on to any number of other tools for further action, such as to your network management tool
13%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
encryption. The Detect category offers techniques that can be used to detect malicious activities or to evaluate general activities on your network. Staying with the phishing example, clicking on Sender MTA
13%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
to the Internet safely without anything but some Access Control Lists (ACLs) combined with an eye for minimalism. I’m referring to keeping the number of packages (and more specifically network services
13%
TheSSS: World's Smallest Server Suite
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © zhao lizu, 123RF.com
The temporary workgroup you have set up wants to save its files on a dedicated FTP server; you want to try out a proxy to see if you can reduce the network load and set up a web server
13%
Do You Know Juno?
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © alexskopje, 123RF.com
to prepare carefully and professionally for an upgrade. Neutron The Open vSwitch driver in OpenStack's Neutron networking component was tagged as deprecated in Icehouse. Juno no longer contains the driver
13%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
or a direct stream of network data, for example, serve as output data. In the case of anomalies, the system executes actions according to the specifications defined in playbooks (e.g., informing a cybersecurity
13%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
Protecting your network environment with the latest virus protection, controlling what software is installed and allowed to run, restricting network access, protecting web browsing, limiting user
13%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
Often, users fail to back up their data regularly and synchronize backups. Of course, any data you store locally should also be stored on a remote mass storage device. If the local server or network
13%
Serverless applications with OpenFaaS
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kier in Sight Archives on Unsplash
, including access control and network restrictions. Gateway Authentication and Access Control As discussed, OpenFaaS gateway comes with basic authentication enabled by default. Always keep authentication
13%
System Logging for Data-Based Answers
25.01.2018
Home »  HPC  »  Articles  » 
Another popular option is rsyslog (remote syslog), an open source tool for forwarding log messages to a central server using an IP network. It is very configurable using the /etc/rsyslog.conf file

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice