Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year
100%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
shamir Initialized true Sealed false Total Shares 1 Threshold 1 Version 1.3.2 Cluster Name vault-cluster-e5878f26 Cluster ID 54ef0ecc-5f31-0926-e904-1bd94bc152ae HA Enabled
97%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
b8973f272a0a1 2 months ago Running build-code 0 3c60d6053a26a build-code-deployment-68dd47875-85tb8 1c059432e17bc 8a648053c00f5 2 months ago
71%
Get started with OpenShift
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © andegro4ka, 123RF.com
.168.42.78:8443 http://nodejs-ex-myproject.192.168.42.78.nip.io to pod port 8080-tcp (svc/nodejs-ex) dc/nodejs-ex deploys istag/nodejs-ex:latest <- bc/nodejs-ex source builds https://github.com
71%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
a Persistent ZAP Container root@chris:~# docker run -d -u zap -p 5900:5900 -p 81:8080 -i owasp/zap2docker-stable 03736c2a2088ef47dc4e2a82fbdf5f153e34f05834fecf23ede46c2061fda423 root@chris:~# docker exec -it
67%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
intelligence (OSINT) tools, Nmap, Maltego Packet capture tools – Wireshark, tcpdump Exploit tools – Metasploit, Meterpreter, and BeEF Security information event management and intrusion

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice