Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25252525252522Rub%252525252525C3%252525252525A9n Llorente%2010 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (279)
  • Article (57)
  • News (39)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 38 Next »

56%
Prowling AWS
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Dmitry Naumov, 123RF.com
. For some additional context, sections on the AWS Security Blog [3] are worth digging into further. To bring more to the party, the sophisticated Prowler also stealthily prowls for issues in compliance ... 2020
56%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
is mounted at /dev/sdb, enter: $ sudo dd if=Rockstor-3.8-9.isoof=/dev/sdbstatus=progress Once it's done, boot the computer from the disk and navigate to the installer [3]. Rockstor is based on Cent ... 2020
56%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
with your tenant (Figure 3). Although this procedure might sound redundant, it is set up for your privacy. If the request is accepted, the partner can then be found as an external identity in the directory ... 2020
56%
Windows Admin Center for managing servers and clients
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Dietmar Hoepfl, 123RF.com
(Figure 3). In the upper area, you can switch between the web-based Server Manager , the Failover Cluster Manager , the Hyper-Converged Cluster Manager , and Computer Management for PCs. The main window ... 2020
56%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
location for WDAC policies and create a WDAC policy: $CIPolicyPath="C:\CIPolicyStore" New-CIPolicy -Level PcaCertificate -FilePath $InitialCIPolicy -UserPEs 3> CIPolicyLog.txt The PcaCertificate parameter ... 2020
56%
Setting up DevOps Orchestration Platform
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © J¸rgen Acker, Photocase.com
.5) [5] Ansible 2.8.1 Python 3.6.9 Python 2.7.17 Terraform v0.12.0 Golang: go1.10.4 linux/amd64 [6] For a list of current restrictions and limitations, see the "Limitations" box ... 2020
56%
Interview with the MariaDB Foundation board Chairman Eric Herman
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
2020
56%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
standard that can even be distributed from Docker Hub. Duffle Duffle (Figure 3) unabashedly refers to itself as the reference implementation of the CNAB format and provides a variety of functions ... 2020
56%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
is destinationSelector (or the destination label) app:vpn-gateway (Listing 2, lines 3-9). If the request comes from the pod, the source label (line 10) is missing. The route then automatically takes you ... Mesh Service for OSI Layers 2 and 3 ... 2020
56%
OPNids: Suricata with built-in machine learning
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © sarah maher, 123RF.com
into Suricata. In this article, I first look into Suricata in detail and then introduce the Dragonfly machine learning engine (MLE) [2] specifically designed for Suricata. Finally, I look at OPNids [3], a fork ... 2020

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice