Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (438)
  • Article (99)
  • News (43)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 59 Next »

57%
Shell access via a web browser
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Roman Pyshchyk, 123RF.com
authorities. CAcert [3] is a community-based alternative solution. Finally, another option is to create self-signed certificates with OpenSSL. Listing 1 takes you through the steps required for this. If you ... 2012
57%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
machine. On the basis of these hardware conditions, I gradually increased the number of checks, starting with 1,000 checks, then moving up to 1,400, and finally 2,200. Figure 3 shows how Nagios latency ... 2012
57%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
visit the ClusterLabs website [3]. Infos Details of STONITH with SBD: http://www.linux-ha.org/wiki/SBD_Fencing The meatware STONITH plugin: http://hg.linux-ha.org/glue/file/0a08a469fdc8/doc ... 9 ... 2012
57%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
9 ... 2012
57%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
to view other system folders, such as the trash or the Action Center: 645FF040-5081-101B-9F08-00AA002F954E BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6 respectively. A full list is available at the MSDN Library ... 9 ... 2012
57%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
to access the network without any restrictions. Windows supports NAP for Windows XP SP3 with some restrictions, which no longer apply to versions as of Windows Vista. Many Roads Lead to Rome Various types ... 9 ... 2012
57%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
environment, the tools that professional attackers use [3], and how intruders hide malicious files from virus scanners [4]. In this article, I will walk you through using the latest version of the Nessus pre ... 9 ... 2012
57%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
2012
57%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
lockdown: iOS 5: handle 'Error' key in lockdown_check_result 03 d2db9b97b0487e3e0c65cca0e0dd02a747a61113 Fix memory leak in idevice_device_list_free 04 d51431edc3987cb9e595fdec874cdf869935d21d idevicebackup2 ... 2012
57%
grml – 32 and 64 bits
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
2012

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice