Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (140)
  • Article (39)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 19 Next »

93%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
Companies often do not exclusively use public cloud services such as Amazon Web Services (AWS) [1], Microsoft Azure [2], or Google Cloud [3]. Instead, they rely on a mix, known as a hybrid cloud
93%
Integrating AWS Cloud Services with Your Custom Apps
21.01.2014
Home »  Articles  » 
 = reservation.instances[0] 06  07 raw_input("Press ENTER to stop instance") 08  09 instance.terminate() For better orientation with a large number of instances, the Amazon Cloud provides tags. Thus, you can
93%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
: The various modes of PortSentry. In standard, basic port-bound modes, it runs in the background and reports any violations, whereas in Stealth modes, PortSentry will use a raw socket to monitor all
93%
Using a Tablet as a Portable Management Console
14.11.2011
Home »  Articles  » 
 
are showcased here. SSH If you have UNIX or Linux systems in your environment, you’ll require a paid SSH client program. The iSSH app from Zingersoft is a multiprotocol app, in that it supports SSH, Telnet, Raw
93%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
that doesn't use raw packets but instead triggers the operating system to make a connection. The second – and both types appear to need root privileges, incidentally, at least on my desktop – is a -sS scan
93%
How Open Source Helped CERN Find the Higgs Boson
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Tim Bell
the world and using their resources, but when needed, CERN also exploits public cloud resources. It uses its on-premises CERN Cloud, T-Systems Cloud (a subsidiary of Deutsche Telekom), and Google Compute
93%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware
93%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
at the end of the respective test configuration. In the results view, GoReport lists the details of a campaign. From the detailed view, you can export the results or the raw data to a CSV file. The Gophish
93%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
to serve secured content. Figure 3 shows as example test with Google's search engine as the endpoint, historically one of the Internet's snappiest endpoints. Results are provided for new sessions as well
93%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
stores the data transmitted by the collectors so that they are then available for analysis by Spot Workers, which read, analyze, and store the data in Hive tables. This procedure prepares the raw data

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 19 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice