Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: thread medicine https://simplemedrx.top ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • Article (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 Next »

100%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
developer blog: http://blogs.technet.com/b/ad/archive/2015/05/04/microsoft-advanced-threat-analytics-public-preview-release-is-now-available.aspx/ System requirements on TechNet: https ... Classic security safeguards, like antivirus and firewall products, are imperative for system protection. To search proactively for network intruders, as well, Microsoft offers Advanced Threat ... MS Advanced Threat Analytics ... Security analysis with Microsoft Advanced Threat Analytics
46%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
.yml -o threats.txt Figure 3: The top part of the output analyzing the Apache logfile (redacted to protect the innocent). I chose to output to a file ... Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.
45%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
-guardduty-example Member Terraform code: https://www.terraform.io/docs/providers/aws/r/guardduty_member.html Detector information: https://www.terraform.io/docs/providers/aws/r/guardduty_detector.html Threat ... Amazon GuardDuty continuously monitors your AWS accounts and workloads for potential threats.
39%
Response automation with Shuffle
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Kenneth Berrios Alvarez on Unsplash
the commands: git clone https://github.com/Shuffle/Shuffle cd Shuffle sudo install -d -m 0755 -o 1000 -g 1000 shuffle-database Before you can launch Shuffle, you need to configure the settings for your ... The concept of security orchestration, automation, and response (SOAR) is increasingly important in IT security to counter ever-growing threats. We introduce Shuffle, a tool that lets you define
39%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
Unified Threat Management (UTM) stands for complete protection. UTM systems filter incoming and outgoing network traffic, detect and prevent attacks, and block and quarantine viruses ... UTM systems combat all kinds of dangers under the policy of Unified Threat Management. The demands and expectations of customers fuel competition. Two of the most popular manufacturers – Endian
36%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
illustrates the differences between unfiltered and filtered DNS queries. Figure 1: Comparison of unfiltered (top) and filtered (bottom) DNS traffic. Nx ... Filtering HTTP connections and employing traditional proxy servers can protect users from web threats but also increase latency. DNS filters would be a better option, but they lacked authentication
35%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
be processed as quickly. The biggest advantage of the VPX version is rapid deployment via virtual machines. However MPX models have advantages in terms of data encryption, such as in SSL offloading. On top ... Since Microsoft announced the discontinuation of its Threat Management Gateway (TMG) – successor to the Internet Security and Acceleration (ISA) Server – companies have been looking for an adequate
31%
News for Admins
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
 
Web Services (AWS). According to the announcement (https://ciq.com/blog/ciq-offers-lts-for-rocky-linux-8-6-8-8-and-9-2-images-on-aws/), this LTS "ensures extended life for discontinued major and minor ... in 2023; Docker Build Cloud Announced; Wi-Fi CERTIFIED 7 Announced; EU Commissions Nostradamus Project for Quantum Testing; and NIST Identifies Main Types of Adversarial Machine Learning Threats, Git
25%
News for Admins
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
 
." Attackers Use PRoot to Expand Scope of Linux Attacks The Sysdig Threat Research Team (https://sysdig.com/blog/proot-post-explotation-cryptomining/) recently reported attackers "leveraging an open source tool
24%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
-expanding digital world, implemented by following current development trends and practices, embracing automation, and promoting a collaborative, security-aware culture. Infos OWASP Threat Dragon: https://owasp.org/www-project-threat

1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice