Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (149)
  • Article (46)
  • News (13)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 21 Next »

56%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
secure-by-design stance. Unbound is a modern successor to Dan Bernstein's djbdns [3], because its design is focused on security and it includes DNSSEC. Developer NLnet Labs describes Unbound ... 52
56%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
, and alerts are then sent by MQTT and stored in a SQLite database. The front end is a lightweight Flask app [3]. Figure 2: The honeyBot project flowchart ... 52
56%
Test JavaScript programs with Karma
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image Photo by Pierre Bamin on Unsplash
to established test frameworks, such as Jasmine [2], Mocha [3], or QUnit [4], relying on plugins to do so and negating the need for web developers to learn new software. You can also integrate in-house test ... 52
56%
Five graphical database front ends
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © yewkeo, 123RF.com
be operated in front ends. Above all, this includes how easily users can create queries that give them quick access to the data. In this article, I look at several free front ends: Base [1], Glom [2], Kexi [3 ... 52
56%
Fedora Server 30 (x86_64)
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
for cloud and bare metal and bills itself as a secure and easy-to-administer "short-lifecycle, community-supported" operating system [2]. It includes the following features: Linux System Roles [3]: roles ... 52
56%
The Fine Art of Relationship Maintenance
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © scanrail, 123RF.com
52
56%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
to check the hash reported by your SHA256 checksum tool with the listed checksum to verify that you have indeed downloaded the correct file and it has not been tampered with en route: $ sha256sum backbox-5.3 ... 52
56%
News for Admins
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
 
52
56%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
by the Linux Foundation's recent announcement [2] of yet another open source foundation, this one tasked with steering the development of a really under-appreciated tool named osquery [3]. The announcement ... 52
56%
Turbocharge your network with Zeroshell
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Przemyslaw Koch, 123RF.com
into the Bridge Components list (Figure 3). Do this for both the interfaces, then click Save to activate the new bridged interface. That's it. You can now connect devices to the new wireless access point ... 52

« Previous 1 2 3 4 5 6 7 8 ... 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice