Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 160 Next »

38%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
credentials are used for a large number of systems, which in turn means that the passwords of these accounts are not changed often enough. An agent-based monitoring architecture does not require you
38%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
manager, Helm. Figure 3: Falco does not examine existing containers for images but instead hooks into their network communication, checking it for various
38%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
in a worst case scenario. To ensure that containerland does not turn into a horror movie, companies need to bear a few things in mind when they look to operate a large number of containers. After all
38%
Configure Entra ID with PowerShell Desired State Configuration
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Tom Hermans on Unsplash
without a word. It does not hurt to update the dependencies after installation: Update-M365DSCDependencies Once the setup is complete, proceed to load the module by typing Import-Module Microsoft365DSC
38%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
AccountControl value of 2 means the account is deactivated, and the value 66048 is the sum of 65536 (password does not expire) and 512 (normal user account). If you want to find particularly worthwhile targets
38%
Manage user accounts with MS Entra lifecycle workflows
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Aliaksandr Marko, 123RF.com
Basic operations relate exclusively to user accounts in Azure AD. The Lifecycle workflows option does not provide direct connectors (e.g., to Active Directory Domain Services) or to other HR services (e
38%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
token value as a parameter. An example that uses Terraform [3] and a Google Compute Engine instance starts with the creation of a tunnel (Listing 1). First, a random hash is needed with at least 32 bytes
38%
What's new in Ceph
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Domenico Loia on Unsplash
by no means does everyone who operates Ceph also rely on the OpenStack private cloud environment. Red Hat previously expressly pointed out that Ceph in the form of Red Hat Storage is also available without
38%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
in containers, grouped by namespaces and route traffic to HTTP/ HTTPS through routers from the host to the pod. LANP does the same thing, but without Kubernetes. The Linux host runs Podman for the containers
38%
Native serverless computing in Kubernetes
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Adam Bixby on Unsplash
If you check out the undisputed star of the container scene and its serverless capabilities, you might be somewhat disappointed to find that Kubernetes (K8s) really does not shine out of the box

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice