Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (824)
  • Article (227)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 106 Next »

14%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
Server 2008 R2 that allows admins to manage application access to users. This serious flaw targets business users and not just home users, and it affects the latest Windows 10 systems, as well as earlier
14%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
_stack.yml:ro docker compose -f /etc/compose/moto_server_stack.yml exec awsclitest sh -c 'aws ec2 terminate-instances --instance-ids i-6ce75b7f81a552ce0' These working examples should be enough to help you get
14%
Web applications with Flask
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Photographer, 133RF.com
, and it is uncertain when version 0.10 will be released. Flask requires at least Python 2.5; Python 3 is not currently supported. The easiest approach is to install Flask with Virtualenv [4], which maintains a local
14%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
-alive Cookie: PHPSESSID=bv3jerd7e9s2hsi2hs8cv2r7ua; security=impossible 208.54.155.25/scripts/csrf/ The key information in this connection is that the website uses PHP and keeps its PHP scripts
14%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
) and tell you which client generates the most Internet traffic. Questions like "Which Windows file servers are being used, and which machines offer unauthorized shares?" or "Which client is accessing
14%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
-interactive/pam for root from 1.0.0.1 port 4321 ssh2 # Feb 22 8:00:10 AM hostname sshd[1234]: Failed keyboard-interactive/pam for invalid user mysql from 1.0.0.1 port 4322 ssh2 FILTER=' cat /var/log/secure | awk '\''$5
14%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
, forcing filesystem sync to ignore caching effects. Random reads and random writes , run by the iozone [14] benchmark, iozone -e -I -a -s 100M -r 4k -i 0 -i 1 -i 2 [-f file>] are 4K random I
14%
News for Admins
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
 
kernel review and testing." Other kernels in the program include 4.4-cip, 4.19-cip, and 5.10-cip. HTTP/2 Protocol Exploited in Largest DDoS Attack Ever Google, Cloudflare, and Amazon Web Services have ... Technology Environments; Civil Infrastructure Platform Adds New Super-Long-Term Linux Kernel; HTTP/2 Protocol Exploited in Largest DDoS Attack Ever; Docker Announces Three New Products for Secure App Delivery
14%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
Version: networking.istio.io/v1alpha3 02 kind: Gateway 03 metadata: 04 name: wordpress-gateway 05 spec: 06 selector: 07 istio: ingressgateway 08 servers: 09 - port: 10 number: 443 11 name: https
14%
Securing containers with Anchore
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © loiic, Fotolia.com
's popular images and listed on the CVE website [1] might surprise you. According to a new report from the venerable Snyk [2], who knows about all things security focused, the top 10 most popular container

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice