Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (946)
  • Article (262)
  • News (43)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 126 Next »

19%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
19%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
so, for a combination of open source software with extension modules and commercial support. Starting Point The backup software originally used was IBM's Tivoli Storage Manager [3]. However, a review
19%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
vulnerabilities. If you don't want to fire OpenVAS at your servers, you can use the leaner Lynis [3]. The tool runs more than 200 tests and after a few minutes presents its report in the terminal or by email
19%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
on the GitHub platform [2] under the GNU Affero General Public License version 3 (AGPLv3). In this article, I look at the free version's basic feature set. Relay Servers Depending on the operating system
19%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
In PowerShell 3.0, Microsoft lets admins manage, install, or adapt virtually any service on a Windows server via the shell. In this article, I introduce some of the new and interesting commandlets
19%
Designate provides DNS as a Service in OpenStack
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Gabriele Maccaroni, 123RF.com
.g., www.example.com ). To that end, a corresponding A record (or AAAA [quad-A] record for IPv6) must be stored for a domain, and a corresponding PTR record (which refers to the A record) must be created
19%
An overview of VMware tools
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Giuseppe Ramos, 123RF.com
Compute Engine, Rackspace, Microsoft Azure). The service is now available in the US as part of the Early Access Program, with a plan for it to go on general sale in 2013Q3; the rumored release date
19%
PC over IP
03.09.2013
Home »  Articles  » 
 
and data, PCoIP can allow or prohibit looped USB devices explicitly. Workstation with Host Card With a host card, you can turn a powerful Windows or Linux PC (and probably Macintosh computers from 2013Q3
19%
SSH on Windows
17.09.2013
Home »  Articles  » 
-keygen -t rsa (optionally, ssh-keygen -t dsa ) to generate a new RSA or DSA key pair of public and private keys (Figure 3). Figure 3: Generating a RSA key
19%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
, or simulated by the honeypot. The set of services visible to the attacker on the target system is equal to the total set of the services offered by the server and the analysis system (Figures 3 and 4

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 126 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice