Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (550)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 Next »

9%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
Directory, with the service account in whose context ADFS runs. It does not have far-reaching rights, but if it is blocked, nothing will work. It is also advisable to use a Group Managed Service Account
9%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
tab within the Proxy section. For the rest of the exercise, you'll need a browser (Firefox), two Firefox extensions (Cookies Manager+ [2] and FoxyProxy Standard [3]), and Burp Suite
9%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
name/NetBIOS name (WIN-NJKFH7RKUAQ) The computer's workgroup That it is running Microsoft Networking/Server Message Blocks (SMB) From a security analyst's perspective, Figure 3 shows what
9%
Domain-driven design and agile development
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © omnimages, 123RF.com
a weekly live-stream on the topic of software architecture [7]. His technological focus is on modern architecture and development approaches such as continuous delivery, DevOps, and microservices.
9%
Credential management with HashiCorp Vault
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
. Figure 3: The process of an SSH login with Vault with, in this example, an OTP. For example, the setup on CentOS is quite easily managed. To verify the login data, you need a special pluggable
9%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
run multiple pods, each with its own MariaDB container, without any of them blocking the host's port on 3306. Within the pod, Ansible then rolls out the required containers with matching configurations
9%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
with your tenant (Figure 3). Although this procedure might sound redundant, it is set up for your privacy. If the request is accepted, the partner can then be found as an external identity in the directory
9%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
a range of hosts on the command line: $ pdsh -w host[1-11] uname -r $ pdsh -w host[1-4,8-11] uname -r In the first case, pdsh expands the host range to host1 , host2 , host3 , etc., through host11
9%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
. Among the parallel shells available, many are written in Python, which has become a very popular DevOps tool. Some of the tools are perhaps not as appropriate or useful for HPC but may be good for other
9%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
that can be hijacked by attackers on the web is not a good thing. Unfortunately, precisely this kind of attack has been extensively documented in the operations security (OpSec) scene. Often the companies

« Previous 1 ... 61 62 63 64 65 66 67 68 69 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice