Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 138 Next »

28%
Network monitoring with Zeek
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Susann Schuster on Unsplash
are useful for occasional analysis, but for permanent network monitoring and as an alternative to intrusion detection systems, Zeek is a very interesting tool. Network Monitoring Keeping track of device
28%
Secure passwordless logins with FIDO2 and LDAP
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
objects and attributes in an LDAP schema, you can now request a personal OID range from the Internet Assigned Numbers Authority (IANA) [1]. The allocation of a subtree for your own OIDs is very convenient
28%
Integrating Podman and systemd
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Nick Fewings on Unsplash
no difference, at least from an administrative point of view, between running a systemd service directly on the host or inside a container. The auto-update feature is also very useful for keeping container images
28%
Save sudo logs on a remote computer
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by the blowup on Unsplash
feature of sudo is I/O logging, which lets you tell sudo to execute every command inside a pseudo-terminal to log all input and output. This feature is very useful if you want to create an audit trail
28%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
, you need to create additional rules in the FORWARD chain. However, although Docker leaves the INPUT and OUTPUT chains untouched, it uses the FORWARD chain very often and quite recklessly. Because Docker
28%
News for Admins
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
 
an archive named run.tar.xz, which includes an ELF binary named run (the actual malicious payload). Very soon after it was discovered, web-browserify was taken down from the npm repository. That doesn't mean
28%
Interview: Nginx's Gus Robertson
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
"Nginx and Apache" instead of "Nginx vs. Apache." A very common starting pattern is to deploy the open source Nginx software as a proxy (or Nginx Plus as the application delivery platform) in front
28%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
nspawn qemu-rhel-standalone_vagrant_rhel vm libvirt-qemu Conclusions The systemd developers have added some very useful features to the current release and have thus continued to expand
28%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
is very flexible, supports booting a system from many different sources, and enables block device abstractions like RAID, LVM device mapper, FCoE, iSCSI, NBD, and NFS. Thanks to its modular structure
28%
Regular expression security
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Jakub Jirsak, 123RF.com
(.) for all possible input symbols lead to very large state machines. Attack with ReDoS A state machine's performance when checking regular expressions depends on many factors: the size of the state machine

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice