Customers in  Europe, Switzerland, and the United Kingdom, please click here.


Attention Existing Customers: Welcome to our new shop! Your account has not been migrated from the old system. If you wish to purchase something, you will need to create a new account or checkout as a guest. Please note that guest checkout is not available for digital products or subscriptions.
ADMIN #56 - Print Issue

ADMIN #56 - Print Issue

https://shop.linuxnewmedia.com/web/image/product.template/205/image_1920?unique=284f503

Secure DNS – Stop snooping and cache poisoning

In this issue, we look at solutions for encrypted DNS, so admins can block domains that distribute malware.

On the DVD: Kali Linux 2020.1 (Live)

16.99 16.990000000000002 USD 16.99

16.99

Not Available For Sale

    This combination does not exist.


    IN THIS ISSUE:

    Interview: Eric Herman
    Eric Herman, Chairman of the MariaDB Foundation board, sheds light on the evolving focus of the custodians of one of the most popular and widely used databases.

    Secure DNS
    DNS encryption prevents the evaluation and filtering of name resolution in the enterprise.

    NAS with Rockstor
    Build a network-attached storage box with Rockstor to manage your data.

    DevOps Orchestration Platform
    Bootstrap an IT infrastructure dynamically or import details of an existing IT infrastructure locally on VirtualBox or in the Cloud.

    Creating Virtual SSDs
    An economical and high-performing hybrid NVMe SSD is exported to host servers that use it as a locally attached NVMe device.

    Windows Admin Center
    This browser-based remote management app for physical, virtual, and on-premises servers consolidates several Windows Server admin tools.

    CNAB
    Cloud-native application bundles are an easy option for distributing applications in a microservice architecture.

    Kubernetes for IoT
    The k3s Kubernetes distribution handles both unattended workloads in remote locations with minimal resources and clusters of IoT appliances.

    Kubernetes Security
    We look at the options for authentication, authorization, and access control in Kubernetes clusters.

    Azure AD Identity Governance
    Security processes for organizations with users who access resources or collaborate with partners in the cloud.

    OPNids
    Does OPNids combine the Suricata IDS with machine learning to detect attack threats automatically, as advertised?

    Windows Defender App Control
    Protect systems against threats that traditional virus scanners and signature-based mechanisms cannot detect by restricting applications in the user context and reducing the code allowed in the system kernel.

    PowerShell and Exchange Online
    Exchange Online in Office 365 can be managed just like its local counterpart with similar, sometimes identical, PowerShell cmdlets.

    Analyzing Azure AD Logs
    The relevant sign-in and audit logs in Azure Active Directory can be exported to external data sources to provide not only long-term archiving, but also the freedom to analyze the stored data.

    Bash AWS Lambda Layer
    A piece of old-meets-new functionality lets you run Bash scripts in an AWS Lambda layer.

    Network Service Mesh
    We explain how this new sandboxing project resembles a conventional service mesh and what makes it different.

    Secure Data with stunnel
    A TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.