Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 157 158 159 160 161 162 163 164 165 166 167 168 169 170 ... 200 Next »

12%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
transparent login to more Kerberos services. Before this can happen, however, the user must initially prove their identity to the KDC. This process is also known as pre-authentication and provides protection
12%
The weak spot of SBCs
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Lucy Baldwin, 123RF.com
An omnipresent characteristic of current single-board computers (SBCs) is the use of SD cards to provide mass storage functionality, either for system boot or data storage purposes. Unfortunately
12%
Passkeys eliminate the need for password-based authentication
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Olivia, Fotolia.com
. Once the response provided by the device is validated, the user is considered to be logged in. Although this sounds complicated, it all takes place under the hood. The user only has to navigate
12%
Pentest your web server with Nikto
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mike Wilson on Unsplash
provides the options. To test for SQL injection only, run the command ./nikto.pl -url example.com -Tuning 9 You can also exclude individual tests. Assuming you want to check everything except SQL injection
12%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
such data confidentially and verify its integrity on recovery. Encrypted backups or routinely encrypted older files in an archive primarily provide protection against a potential attacker copying large
12%
Load test your website with Siege
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Aarón Blanco Tejedor on Unsplash
be sure you have administrative access to your system. In this article, I provide instructions on how to use the Siege benchmarking tool to stress test a website hosted on an Ubuntu 20.04 server. Why Care
12%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
you against ransomware attacks. As a preventive measure, employees should not open any attachments from unknown senders. Recipients of such email messages should check the sender information provided
12%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
to the corresponding computers on your private network. The raw and security tables are used far less frequently and provide functionality to prevent connection tracking or to mark packets in SELinux contexts. Each
12%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
, but the concept is very similar to, for example, Microsoft authentication, where you need to have a user account and permissions to access any resource on the network. Cloud providers have an extensive selection
12%
News for Admins
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
 
board will be created for this project, one that will consist of a rotating committee of experts who will influence the agenda and provide input, oversight, and support. It's important to note that Linux

« Previous 1 ... 157 158 159 160 161 162 163 164 165 166 167 168 169 170 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice