Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"52%2008 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (401)
  • Article (84)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 53 Next »

56%
Shell access via a web browser
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Roman Pyshchyk, 123RF.com
Secure Shell makes it easy to manage an external web server. Thanks to X forwarding, you can even run graphical tools to manage your computers at home, assuming the connection is fast enough ... 2012
56%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
changes over time, with the x axis showing time progression, and individual phases with the number of checks indicated above the axis. The y axis shows Nagios latency in seconds. One thing you might ... 2012
56%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
2012
56%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
/bin/vim 13 14 dn: cn=badboys_rules,ou=SUDOers,dc=tuxgeek,dc=de 15 objectClass: top 16 objectClass: sudoRole 17 cn: badboys_rules 18 sudoUser: %badboys 19 sudoHost: ALL 20 sudoCommand: /usr ... 2012
56%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
2012
56%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
of NAP are available for access protection, including: DHCP, VPN, IPSec, Terminal services (e.g., Remote Desktop Services), and IEEE 802.1X devices. This article relates to access via wired 802.1X devices ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they ... NAP with 802.1X ... Port-based access protection with NAP and 802.1X ... 2012
56%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
. In the first example, I use the meterpreter script persistence (to see a list of options, use the -h switch): Meterpreter > run persistence -h Meterpreter > run persistence -X -i 5 -p 5555 -r 10 ... 2012
56%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
2012
56%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
data nodes 11 27d0da3bc196d28c1095e7c74054f5a6efb7ccf2 idevicebackup2: fix restore command option handling 12 f20cf2b4f14b66f38984e21dbed41da27c03e23a idevicebackup2: Add typedef for GStat ... 2012
56%
grml – 32 and 64 bits
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
. Apart from these command-line tools, Grml includes an X server, as well as the minimalist window manager Fluxbox. The version provided on Linux Magazine 's cover disc contains the grml96 release ... 2012

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice