Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 58 Next »

33%
Professional protection for small and mid-size enterprises
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Guido Vrola, 123RF.com
. Figure 2: In the Policy Manager, you define which apps the Untangle firewall applies for a rule. In the settings, the Policy Manager shows the existing policies on the left and the applications
33%
Getting started with Prometheus
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Clay LeConey on Unsplash
, it allows for in-depth querying and timely evaluation through a proprietary query language called PromQL [1]. Such queries can be used to create alerts rules that notify you whenever your target behavior
33%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
changes. On recent systems, you can use polkit to do this. As of version 0.112, you even have a separate engine, which you can feed with JavaScript-based rules. You can really do some interesting things
33%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
. The requests must originate from the 192.168.2.0/24 subnet and are only allowed to use GET and POST methods. Listing 1 Access Rules §§number access_control: rules: - domain: wiki
33%
Manage guest accounts in Azure Active Directory
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jon Tyson on Unsplash
Efficient collaboration while maintaining security standards is often difficult, especially when it comes to the end-user experience. Business-to-business (B2B) transactions are made in the cloud
33%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
is still in transition, so you'll see both product names mentioned throughout this article. Adding to the confusion, Palo Alto Networks offers two similarly named products [2]: the software-as-a-service (Saa
33%
Improved visibility on the network
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Sergii_Figurnyi, 123RF.com
traffic as of interest, desirable, or undesirable. The example in Figure 5 shows a custom bidirectional rule that assigns TCP and UDP traffic on port 873 between IP addresses 10.1.2.10 and 192
33%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
to the five levels of CMMC 1.0. CMMC 2.0 In March 2021, the DoD initiated an internal review of CMMC's implementation, informed by more than 850 public comments in response to the interim DFARS rule
33%
Identity and access management with OpenIAM
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Chatree Jaiyangyuen, 123rf.com
, such as a self-service portal for resetting user passwords or for additional authorization requests. A single sign-on based on modern protocols such as OpenID Connect or Security Assertion Markup Language 2
33%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
, you can use Microsoft Forefront Identity Manager (FIM) 2012 R2 or, even better, Microsoft Azure Active Directory Connector [2]. The data must be synchronized before you configure the hybrid deployment

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice