Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (87)
  • News (11)
  • Article (8)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

53%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
--serial 05:0e:50:04:eb:b0:35:ad:e9:d7:6d:c1:0b:36:d6:0e:33:f1--signature-algorithm1.2.840.10045.4.3.2--issuer-o Let's Encrypt--pubkey-algorithm rsa--pubkey-size 256 This check would give you a pretty good
52%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
represents different aspects and functions within an industrial network. Levels 0, 1, and 2 relate to direct production control. Level 0 includes sensors and actuators that interact directly with the physical
52%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
ADRecon Prerequisites .NET Framework 3.0 or newer (included in Windows 7 and later) PowerShell 2.0 or newer (included in Windows 7 and later) AzureAD PowerShell Module 3.0 or newer – installable
52%
The Logic of Helping Users
04.11.2025
Home »  Articles  » 
after breaking it into pieces. Once more, I stopped writing and dropped this article (0 for 2). I took one final swing at having AI tell me what it thought the important issues were in HPC. This time I
52%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
to the root user. If you want to check all files, you can set scan_ignore_root="0" in the conf.maldet configuration file to check the entire database. When maldet needs to scan large areas of the filesystem
52%
Web-based network monitoring
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © arasdubov, 123RF.com
browser on http://127.0.0.1:9000 and log in as admin with the default password bloonix . The service's web interface first opens a dashboard on which you can view the active services and check out
52%
The best performance yet
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lucy Baldwin, 123RF.com
in combination with a card supporting the extended standard (SDXC). CQ mode was introduced in 2017 with version 6.0 of the SD specification [4], but although the Linux kernel had been supporting CQ mode for e
52%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
 (/etc/warewulf/warewulf.conf ). You then add a section to the configuration file: api:   enabled: true   allowed subnets:     - 127.0.0.1/8     - ::1/128     - 192.168.64.1/32 (Note: This code is from the webinar.) By default
52%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
into Excel. Figure 1: Starting the Microsoft Security Compliance Manager. SCM Hands On SCM requires .NET Framework 4.0 [2]. The free SQL Server 2008 R2
52%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
, Russ Cox joined the Go project, and the work went forward a little faster. In November 2009, the team finally presented the first public release of the Go compiler. In March 2012, version 1.0

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice