Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (902)
  • News (102)
  • Article (70)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 108 Next »

35%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
Cole Analysts AG, September 2023, https://www.kuppingercole.com/research/lc81218/attack-surface-management "Forrester's New Research On Attack Surface Management" by Jess Burn, Forrester Research Inc., January
35%
Citrix Provisioning Services reviewed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© henrischmit, 123RF
the matching vDisk. This allows for dynamic load balancing and for more efficient use of the available hardware. Infos Citrix Provisioning Services: http://support.citrix.com/product/provsvr/psv5.0/
35%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
IPA" by Thorsten Scherf: http://www.linux-magazine.com/Issues/2009/102/FreeIPA The Author Thorsten Scherf is a Senior Consultant for Red Hat EMEA
35%
Controlling multiple systems simultaneously with Synergy
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
©Kheng Ho Toh, 123RF.com
options: http://synergy-foss.org/pm/projects/synergy/wiki/Setup Security notes: http://synergy-foss.org/pm/projects/synergy/wiki/UserFAQ#Q-How-secure-is-your-application Tunneling with SSH: http://www.revsys.com
35%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
.gz?download Yubico website: http://www.yubico.com/products/yubikey/ SSH server for Yubikey: http://code.google.com/p/yubico-pam/downloads/ Dogtag PKI: http://pki-svn.fedora.redhat.com/wiki/PKI_Main_Page Open
35%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
status of a volume of data. Infos LVM how-to: http://www.tldp.org/HOWTO/LVM-HOWTO LVM mailing list: http://www.redhat.com/mailman/listinfo/linux-lvm
35%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
, a request like http://www.example.com/index.html?file=/etc/passwd would trigger the sample rule in line 8. Then the action defined in line 9 would block the request. The client sees an HTTP 403 Forbidden
35%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
Logging sudo child processes: https://www.sudo.ws/posts/2021/08/what-is-coming-in-sudo-1.9.8/ syslog-ng configuration examples: https://www.syslog-ng.com/community/b/blog/posts
34%
SSH on Windows
17.09.2013
Home »  Articles  » 
for managing hosts or user interfaces. The word has spread, and Windows administrators can now turn to many graphical tools, such as PuTTY and MobaXterm, as clients. Info [1] WinSSH: [http://www.ssh.com] [2
34%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
-keys --keyserver keyserver.ubuntu.com 98AB5139 Now, update the package list and install the current 4.1 version of VirtualBox: apt-get update && apt-get install virtualbox-4.1 For VRDP support, you still need

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice