Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (15)
  • Article (1)
Keywords

1 2 Next »

100%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, you can also install Defender on Linux devices in your infrastructure, but rulesets other than those recommended in the standard documents are likely to be more useful. The rules for reducing ... The sum total of all possible points of attack can be defined as the attack surface, and you need to take every opportunity to minimize it to the extent possible. Windows has built-in rules
92%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
-australian-signals-directorate-and-others-in-promoting-six-principles/. New Password Rules Recommended by NIST NIST has updated its Digital Identity Guidelines (https://pages.nist.gov/800-63-4/sp800-63b.html#introduction), which provides technical guidance ... with Lunar Time Zone; Open Source Malware on the Rise, According to Sonatype Report; Six Principles of Operational Technology Cybersecurity Released; New Password Rules Recommended by NIST; OpenSSH 9
75%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
eventuality, discourage admins from shopping around, and ensure maximum returns. By the time you have implemented a production-ready Kubernetes (K8s) in this way, you will have paid a large amount of cash
75%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
/release/ A First Check I'll take a look at a simple check in practice, first with Checkmk and then in solo mode. You can find the corresponding rule in Checkmk under Setup | Services | HTTP, TCP, email … ; then
74%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
Attaching an iSCSI Device $ uname -a Linux DANSBOX 6.8.0-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 15:51:52 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux $ lsblk NAME MAJ:MIN RM SIZE RO TYPE
74%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
representative) survey at this year's Chemnitz Linux Days. Anyone in possession of a FIDO2 stick [2] can use it for SSH authentication – provided SSH, at least version 8.2p1 or preferably version 8.3, is available
74%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
compatible with the exported format. Of course, the as-code idea is to roll out the installation from the code and not go down the opposite route. Code vs. Config One basic rule when using Ansible
74%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
've not even mentioned Kubernetes itself (see the "Taming the AI Infrastructure" box). Any administrator who has ever rolled out K8s knows that success is by no means guaranteed. Taming the AI
73%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
transfer) API. REST API A REST API is a set of rules and guidelines for building web services that use HTTP requests and responses to communicate between the client and server. This API is a companion
73%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
, and each driver is assigned a storage class. If an application creates a Persistent Volume Claim (PVC), it can be given the name of the storage class. As a rule, every Kubernetes cluster has a storage class

1 2 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice