Tech et Jeux Vidéo
ADMIN Network & Security

ADMIN Network & Security March/April 2020

ADMIN Network & Security magazine is your source for technical solutions to the real-world problems you face every day. Published six times per year, every issue includes the latest techniques for better network security, system management, troubleshooting, performance tuning, virtualization, cloud computing, and more!

United States
Linux New Media
Lire plus
13,92 €(TVA Incluse)
52,19 €(TVA Incluse)
6 Numéros

dans ce numéro

3 min.
seeing through a web darkly

Research for articles takes me on some interesting trips, but by far, this is the longest and strangest trip thus far in my writing career. For a piece about the dark web, I took a trip into the dark web; of course, like any good writer, I used myself as a guinea pig for the experience, because there are times when hearsay and second-hand accounts just won’t do. This was one of those times. Before this foray into the unknown reaches of the so-called dark web, I’d never cared nor even been curious about such nonsense. To be fair, the dark web isn’t strictly nonsense, but it certainly isn’t for the faint of heart or for those with higher-than-dirt standards of behavior and decorum. The dark web is nasty. It’s vile.…

1 min.
on the dvd

The Kali Linux open source project delivers “more than 300 penetration testing and security auditing programs … that enables IT administrators and security professionals to test the effectiveness of risk mitigation strategies” [1]. The newest Kali Linux [2] is: Non-root: The default user account is now the standard, unprivileged user kali, not the superuser account, root, as delivered in earlier versions. Live network install image. Default Xfce desktop. Rolling distribution, so you get updates as soon as they are available. Python 2 tools removed because Python 2 reached end of life January 2020. Although possible, the developers do not recommend you use Kali Linux as your primary OS, because they do not test that use case. DEFECTIVE DVD? Defective discs will be replaced, email: cs@admin-magazine.com While this ADMIN magazine disc has been tested and…

5 min.
tech news

Open Source Software Dominates the Enterprise A recent Red Hat survey (https://www.redhat.com/en/enterprise-open-source-report/2020) has uncovered something that might not surprise anyone in the open source world – that open source software is dominating the large-scale business IT landscape. In fact, the results of this survey indicate that proprietary software is on the decline, while open source software is seeing a dramatic rise in deployment. From the survey, 95 percent of respondents claimed that open source is strategically important, while 36 percent said it was very important. Of those respondents, only five percent declared open source was only somewhat important. The survey also indicated that 77 percent of respondents agreed that enterprise adoption will continue to grow, with 45 percent saying it will increase slightly and 32 percent stating it will increase significantly. Only 22…

10 min.
enriched ecosystem

The MariaDB database has been around, in one form or another, for more than two decades. It is used by some of the marquee offline and online properties and has an extremely large ecosystem. Although the development of the database mostly happens inside various organizations, it is the mandate of the MariaDB Foundation to ensure the codebase remains open source. At Percona Live Europe, I sat with Eric Herman, Chairman of the MariaDB Foundation board, to understand how the board fosters healthy collaboration in the seemingly complex and tangled ecosystem of the database. Linux Magazine: Yesterday we were talking about how you don’t feel like an outsider in this conference, although all they seem to be talking about is MySQL, not MariaDB. Eric Herman: Do I feel like an outsider? Well, certainly…

12 min.
double-edged sword

Dynamic Name Service (DNS) is a fundamental Internet service. As soon as you enter a computer name (e.g., www.mozilla.org), DNS finds the corresponding IP address, in this case. Without DNS you would have to know IP addresses by heart and enter them directly in your web browser’s address bar. The DNS data packets pass through the network without encryption or signatures. Only a 16-bit random number, intended to ensure the assignment of the request and response, provides rudimentary protection. The requesting client accepts the first incoming response with the correct random number and stores it temporarily in its cache. An attacker need only respond faster than the official DNS server to redirect the request. Inserting fake DNS entries in the cache is known as DNS cache poisoning. Because all DNS…

1 min.
pi-hole dnssec resolver

If you want to use the security advantages of DNSSEC, you need a DNS resolver that can verify the DNS signatures. The easiest way to do this is with Pi-hole [3]. As the name suggests, a Raspberry Pi is all you need on the hardware side, although the software also runs on Debian, Ubuntu, Fedora, or CentOS. A Docker container is also available. Pi-hole was originally an ad blocker, but it is also very useful for filtering malware. Thanks to a good web interface, Pi-hole is easy to configure. If you check the software’s query log (Figure 3), you will immediately see which domains use DNSSEC (here, mozilla.org) and which do not (e.g., firefox.com). For the domains that use DNSSEC, manipulated entries would be detected and blocked. Alternatively, you can easily…