Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00s Llorente"22 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (108)
  • Article (2)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11

58%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
fsync 21 21 21 21 21 22 26 31 lseekm 3,848 766 2,946 762 739 738 757 3
58%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
will default to this mode. You can select it manually by setting the -sS switch, as in nmap -sS www.lemon.com . Figure 3: The SYN scan is similar to the three
58%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
virtual webs.test.com { 15 active = 1 16 address = 192.168.1.250 eth0:0 17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21 ... 3
58%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
and then explicitly allow certain users access. It's similar to the deny by default approach I touched on in another article [3]. To achieve this, the /etc/hosts.deny file would look like this: sshd: ALL To allow
58%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'; 17 // stored hash, would
58%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.S. National Institute of Standards and Technology (NIST). According to the guide
57%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 } 22 } 23 24 Messages { 25 Name = Daemon 26
57%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
recommended as the technical underpinnings. If you prefer to work with Ubuntu, you can go for Ubuntu 22.04. SSL and DNS Required Before the installation can start, you have to meet a few requirements
57%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
} 19 20 -re "($|%|>) " { interact } 21 22 timeout { 23 send_tty "No response from $host\n" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables
57%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed, 3 skipped) 25 0 ... 3

« Previous 1 ... 4 5 6 7 8 9 10 11

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice