Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • News (29)
  • Article (9)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10

24%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
the facility network with state-of-the-art Ethernet switches. Although these technologic advances open up new options, they also harbor specific risks. Centralized control of a zoo of systems on a network
24%
Manage status messages in CouchDB with MapReduce
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Austin Distel on Unsplash
is all it takes to install the packages directly from the repositories, where the source files also reside. CouchDB is written in Erlang/OTP (Open Telecom Platform), a functional language from the world
24%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
such as login credentials and vulnerabilities in third-party software code that an attacker could exploit – think of the SolarWinds compromise in 2020 or the recent attack on the open source XZ Utils toolbox
24%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
functions and proprietary tools. Variants MongoDB comes in two primary variants: MongoDB Community Server or Enterprise Server MongoDB Atlas The MongoDB Community Server is the open source
24%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
with an advanced search. If the portal is not available, the rules can be enabled and disabled with PowerShell, but you must use the GUIDs listed in the table. To enable a rule, open PowerShell in administrator mode
24%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
layer of security for Linux-based web applications. The WAF protects against common web vulnerabilities such as SQL injection, cross-site scripting (XSS), and other Open Web Application Security Project

« Previous 1 ... 3 4 5 6 7 8 9 10

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice