Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25252522Rub%252525C3%252525A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (279)
  • Article (50)
  • News (35)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 37 Next »

59%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
hope to orient you in the correct direction for deploying a log analysis capability. Splunk Although I'm a big supporter of open source, Splunk [3], a commercial product, is probably the gold standard ... 2022
59%
Network monitoring with Zeek
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Susann Schuster on Unsplash
policy scripting language [3] for customization. With its help, you can flexibly adapt your monitoring setup to suit your needs or expand the analysis options to include more network protocols, if required ... 2022
59%
Remote access with ThinLinc 4.12
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Clem Onojeghuo on Unsplash
2022
59%
Secure email communication
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Simon Moog on Unsplash
authorized outbound mail servers. Although designed in 2004, SPF only became the standard recommended by the Internet Engineering Task Force (IETF) in 2014 [2]. From a sample of more than 3,000 domains ... 2022
59%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
, it is clear that the legacy 9-to-5 working model in the office is a thing of the past for many. Even when new people join the company, their first day at work often no longer takes place on the company premises ... 2022
59%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
integrity – and all without really demanding more knowledge from the admin. Another related topic in this context is Rust: Sooner or later we should move away from C. It's just too hard to use the language ... 2022
59%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
arp -a (Figure 1). On Linux computers ip n s Figure 1: The ARP cache can be displayed from the Windows command line. does the same thing ... 2022
59%
New features in Windows Terminal Preview
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Mohamed Shaffaf on Unsplash
Terminal Preview in Microsoft Store: https://www.microsoft.com/en-us/p/windows-terminal-preview/9n8g5rfz9xk3 Windows Terminal Preview on GitHub: https://github.com/microsoft/terminal/releases More ... 2022
59%
Stretching devices with limited resources
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Lucy Baldwin, 123RF.com
the external 12V power supply provided and the USB interface for serial access. Table 1 ESPRESSObin Technical Specs SOC Marvell Armada 3700LP (88F3720) ARM Cortex A53 processor ... 2022
59%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
to vulnerabilities, and also developed STIX and CyBox, which are used to exchange threat information and attack indicators. The MITRE ATT&CK and D3FEND knowledge databases offer techniques that let you retrace ... The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure. ... MITRE ATT&CK & D3FEND ... 2022

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice