Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%2222%21490 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (196)
  • News (35)
  • Article (12)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 25 Next »

95%
Network monitoring with Zeek
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Susann Schuster on Unsplash
is a faster approach. Developers offer ready-made packages there for the classic Linux distributions [2]. With your distribution's package manager, you can mount the required repository and install Zeek ... 2022
95%
Remote access with ThinLinc 4.12
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Clem Onojeghuo on Unsplash
Authenticator. To do this, edit the file /etc/pam.d/thinlinc and make the changes shown in Listing 2. Listing 2 /etc/pam.d/thinlinc #%PAM-1.0 e Auth required pam_sepermit.so e ... 2022
95%
Secure email communication
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Simon Moog on Unsplash
authorized outbound mail servers. Although designed in 2004, SPF only became the standard recommended by the Internet Engineering Task Force (IETF) in 2014 [2]. From a sample of more than 3,000 domains ... 2022
95%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
New software (e.g., the eSIM Business Manager, which EBF developed in cooperation with Deutsche Telekom [2]) can help in these scenarios. In conjunction with a UEM system, an eSIM manager makes ... 2022
95%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
everything down in more detail, while hopefully keeping things reasonably understandable. Maybe a word about one last set of innovations: We recently added support for FIDO2, PKCS#11, and TPM2 security chips ... 2022
95%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
arp -a (Figure 1). On Linux computers ip n s Figure 1: The ARP cache can be displayed from the Windows command line. does the same thing ... 2022
95%
New features in Windows Terminal Preview
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Mohamed Shaffaf on Unsplash
You can pick up both the current version of Windows Terminal and Windows Terminal Preview from the Microsoft Store [1]. Alternatively, a manual install from GitHub [2] is also possible; make sure ... 2022
95%
Stretching devices with limited resources
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Lucy Baldwin, 123RF.com
a Marvell ESPRESSObin [2] v7 (Figure 1), a low-cost, low-power board made by Globalscale Technologies. The ESPRESSObin was one of the earliest single-board computers (SBCs) to sport a 64-bit ARM CPU ... 2022
95%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
[2]. For the Enterprise Matrix, you'll find preparatory techniques in the Reconnaissance phase on the left. On the far right, you'll find an attacker's potential activities after successfully hijacking ... 2022
95%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
logically separate individual parts of the system (Figure 2). A network namespace, for example, lets you create virtual network cards without giving them direct access to the physical NICs of the host ... 2022

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice