Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • News (408)
  • Article (302)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 ... 211 Next »

18%
Web-based network monitoring
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © arasdubov, 123RF.com
browser on http://127.0.0.1:9000 and log in as admin with the default password bloonix . The service's web interface first opens a dashboard on which you can view the active services and check out
18%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
. The open source software updates the inventory independently, integrating access to all systems by SSH or remote desktop. In the centralized, web-based dashboard, the inventory shows all systems
18%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
. The new installation will reside in /opt/nessus and will install over the top of any previous Nessus versions. Start the nessus daemon and open your web browser to https://localhost:8834 , then log in, go
18%
HPC Container Maker
13.06.2018
Home »  HPC  »  Articles  » 
and libraries for building the application(s) and its dependencies. For both users and developers, the containers can be executed as they’ve been created, or you can open a shell into the container. From
18%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
protocol before version 1.3 have opened the possibility of protocol downgrade attacks (Logjam to export-grade cryptography, FREAK to a weak RSA key exchange), connection renegotiation attacks (TLS Renego
18%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
regularly causes problems in the enterprise, is suppressed in Collabora Online. Collabora Online processes documents in the free open document formats as well as the current and older Microsoft formats
18%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
licenses exist that can be built into popular open source playback software. As additional copy protection, all current Blu-ray players integrate the Blu-ray+ technology developed a good 10 years ago
18%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
The first time you roll out a Kubernetes test cluster with kubeadm, superuser certificate-based access is copied to ~/.kube/config on the host, with all options open. Unfortunately
18%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
. If an appliance takes care of all these tasks, it needs to meet the customer's individual requirements precisely. The UTM Firewall by Endian, a company founded in 2003, is one of the few open source firewalls
18%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
Back on the 'bookworm' system, I want to deploy the open-iscsi package [3] (the RFC 3720 iSCSI implementation for Linux). To create a secure infrastructure, couple it by installing the cryptsetup package

« Previous 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 ... 211 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice