Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: เว็บบอลสเต็ป2(liทe@rules)เว็บหวยออนไลน์.ikv ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (26)
  • Article (2)
Keywords

1 2 3 Next »

100%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
given the above rules? In Figure 3 you can see the server illustrated in Figure 2 with 6TB of RAM and four sockets, each with 28 cores or 56 hyperthreads. If you now create a VM, you could get ... Massive, performance-hungry VMs require proper handling to meet their dynamic requirements. We give you some rules to help size these monsters properly.
90%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
. If you want to set the rule Block executable content from email client and webmail to audit mode; you would need to run the cmdlet: Add-MpPreference -AttackSurfaceReductionRules_Ids be9ba2d9-53ea-4cdc-84 ... The sum total of all possible points of attack can be defined as the attack surface, and you need to take every opportunity to minimize it to the extent possible. Windows has built-in rules
84%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
is paramount. 2. Knowledge of the business is crucial. 3. OT data is extremely valuable and needs to be protected. 4. Segment and segregate OT from all other networks. 5. The supply chain must be secure. 6 ... with Lunar Time Zone; Open Source Malware on the Rise, According to Sonatype Report; Six Principles of Operational Technology Cybersecurity Released; New Password Rules Recommended by NIST; OpenSSH 9
71%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
.com --server 192.0.2.73 In this case, availability is not checked via the URL, but directly by way of the forwarding destination, the specific IP address. In practice, you could use a rule with multiple
70%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
). If you like, you can save just this one policy. Figure 2: Before comparing the existing rules with those of the baselines, it makes sense to make a backup
68%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
is called end-to-end (E2E) monitoring (Figure 1) and is primarily used for web applications (see the "Confusion of Terms" box). However, it can also be used for native Linux programs and smartphone apps. E2E
67%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
The Internet small computer systems interface (iSCSI) [1] is a block-level [2] interfacing protocol used in conjunction with any network-attached storage (NAS) unit. As the name implies, iSCSI uses
67%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
representative) survey at this year's Chemnitz Linux Days. Anyone in possession of a FIDO2 stick [2] can use it for SSH authentication – provided SSH, at least version 8.2p1 or preferably version 8.3, is available
67%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
that addresses both external threats and internal vulnerabilities. Misconfigured security rules, particularly in NSGs or Azure Firewall, can lead to the exposure of sensitive data or unauthorized access
67%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
compatible with the exported format. Of course, the as-code idea is to roll out the installation from the code and not go down the opposite route. Code vs. Config One basic rule when using Ansible

1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice