Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 58 Next »

33%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
[2] extension. In the IIS Manager, first install the extension and then call URL Rewrite . Add Rule lets you create new rules (Figure 4). Figure 4: URL
33%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
]. Figure 2: Calico builds a network on the node with BGP and iptables, as in a data center. BGP, Routing, and iptables Rules When creating, Felix assigns an IP address to each pod; iptables rules
33%
A 19-Year-Old Bug in WinRAR
26.02.2019
Home »  News  » 
 
arbitrary code on a targeted system. The bug called "Absolute Path Traversal" bug (CVE-2018-20250) is found in a UNACEV2.DLL, a third-party library. It allows attackers to extract a compressed executable file
33%
Zentyal Server 3.5
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © PozitivStudija, fotolia.com
that are simultaneously installed as prerequisites (Figure 2). Even with the installation of new services, the distribution assists users with a graphical interface. Figure
33%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
Development Kit (CDK) [2] comes into play. The software offers preconfigured Vagrant boxes for Red Hat Enterprise Linux. The virtualization platforms supported by Vagrant include VirtualBox, Hyper
33%
OPA and Gatekeeper enforce policy defaults in Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Mac Gaither on Unsplash
Focus on OPA Admittedly, the idea behind OPA is not entirely new. Various other implementations of policy frameworks are already on the market, such as Chef InSpec [2], for which you define rules
33%
Harden your Apache web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
, you can find the logfile in /var/log/apache2/modsec_audit.log. You can create all the rules and allow and block lists. However, you also can find free and well-maintained default rules
33%
Multicloud management with Ansible
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Pawel Nolbert on Unsplash
and thus discover the internal IP address of a VM, you have to use the gce_private_ip variable. On AWS this would be ec2_private_ip. Even in Ansible, the cloud modules come from the respective providers
33%
OPNids: Suricata with built-in machine learning
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © sarah maher, 123RF.com
word is EVE (extensible event format) [5], which describes Suricata's extremely flexible log function. EVE Lists Most Details As a rule, when you enable EVE output in Suricata (Figure 2), the log
33%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
2) – for example, with connection timeout, heartbeat period, or other option, and all with default values that are acceptable for a standard setup. Of most import are the ingress rules, which define

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice