Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (958)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 ... 133 Next »

16%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
24c434;security=low do you want to test this form? [Y/n/q] After a successful scan, SQLmap presents the potential attack vectors in the form of prebuilt SQL statements. At that point, the user can
16%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
is interesting, however, from a purely technical point of view: Now Windows-oriented folks can use a complete, familiar operating system, just as Linux renegades have been doing for years. Infos
16%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
] $context) $DirectorySearcher.Filter = "(&(member:1.2.840.113556.1.4.1941:=$ComputerDN))" The LDAP Searcher needs more information before it can start working. You can again define the starting point
16%
New Features in PowerCLI 6.0 R3
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Rgbspace, Fotolia.com
indicates nonparticipation. If the computer on which the user is working with PowerCLI Shell has Internet access, the Get-PowerCLICommunity command launches the default browser, pointing to the home page
16%
Features of PowerShell loops
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © bowie15, 123RF.com
of the loop and its execution at some point. PowerShell provides for this scenario with the continue and break instructions. The following example shows their use in a foreach loop: foreach ($file in Dir $env
16%
Working with objects in PowerShell
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Philip Kinsey, 123RF.com
to develop the desired filter. This is why you need to use the $_ symbol. This is a system variable that always points to the current object in the pipeline, which makes it particularly well suited
16%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
Tool: XArp" box). In the attack, swap the MAC address of the original computer with the MAC address of another computer, in this case the one on which you launched Ettercap. Up to this point, Ettercap
16%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
not work properly during a restore, you can restart the Mac by holding down the power button for 10 seconds. At this point, it is important that you unplug all external devices from the Mac, if possible
16%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
machines also launch in the background, but you see the cluster as the transfer point. An AWS-managed offering named Elastic Kubernetes Service (EKS) was used for this example. Although creating
16%
Exploring the AlmaLinux Build System
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © stylephotographs, 123RF.com
for building and managing packages. You can also point the build system at other, third-party Git repositories, which makes it suitable for many in-house DevOps development settings. How Does It Work? The Alma

« Previous 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice