Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1203)
  • Article (281)
  • News (138)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 163 Next »

99%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
for the service [6]. The idea is that professional penetration testers are the most likely people to want AWS access to a cloud installation. At the time of writing, a one-year membership was EUR10 and EUR5 per ... 52
99%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
of the file continuously to your screen: $ sudo tail -f /var/log/osquery/osqueryd.results.log Now you can forward the results logs to any external application (e.g., Zentral [5] or Elasticsearch [6]) for log ... 52
99%
Test JavaScript programs with Karma
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image Photo by Pierre Bamin on Unsplash
frameworks as DIY plugins. On the same principle, Karma plugins support continuous integration with Jenkins [5], Travis [6], or Semaphore [7]. After launching, Karma first loads all the plugins and parses its ... 52
97%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
is adding these entries to the Cobbler database. A typical example looks something like Listing 1. Listing 1 System Settings 01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
97%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
lxc.cgroup.devices.allow = c 1:9 rwm 25 lxc.cgroup.devices.allow = c 1:8 rwm 26 lxc.cgroup.devices.allow = c 136:* rwm 27 lxc.cgroup.devices.allow = c 5:2 rwm 28 # rtc 29 lxc.cgroup.devices.allow = c ... 6
97%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
, 638402 c/s virtual 40 41 Benchmarking: More Secure Internet Password [RSA MD defined by BSAFE 1.x - Lotus v6]... DONE 42 Many salts: 64806 c/s real, 64806 c/s virtual 43 Only one salt: 38381 c/s real ... 6
69%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ... In 1995, the Internet Engineering Task Force (IETF) chose IPv6 as the successor to IPv4. Initially, this was not an issue that raised much interest. But this changed when Microsoft added IPv6 ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your ... Neglected IPv6 Features ... Securing IPv6
68%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
100.net) 56 data bytes 03 64 bytes from iy-in-x63.1e100.net: icmp_seq=1 ttl=52 time=99.6 ms 04 64 bytes from iy-in-x63.1e100.net: icmp_seq=2 ttl=52 time=100 ms 05 64 bytes from iy-in-x63.1e100.net: icmp ... Transitioning from IPv4 to IPv6 will be messy; we describe IPv6 served three ways. ... IPv6 ... IPv6 and Linux
66%
Version 5.2 of the Ruby framework
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Author, 123RF.com
, but still a little too cumbersome to set up and use. At least for the latter group, Rails 5.2 (Figure 1) is a good thing: The developers abolished Secrets and replaced it with simpler credentials. Thus Ro ... Ruby on Rails 5.2 was released during RailsConf, which took place in Pittsburgh in mid-April 2018. Although not much has changed for old Rails applications, you'll find a few notable additions ... Version 5.2 of the Ruby framework
64%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
Rubén Llorente ... . Citadel Rooms Citadel's main characteristic is that everything is a room, at least internally. Rooms are arranged by floors (Figure 6). For example, on a floor called Animal Talk , you might have the rooms

« Previous 1 2 3 4 5 6 7 8 ... 163 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice