Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 201 Next »

17%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
supports IP-based threat lists. Two of my favorites are Tor exit nodes [3] and Open Threat Exchange (OTX) community feeds from AlienVault [4], but you may find some others by just doing some research
17%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
will use ami-4d46d534 as my source AMI ID from now on. In other words, when I begin my process, that is the ID of the AMI that I will reference. Starting with that image, I will then update and customize
17%
WordPress, Joomla, and Drupal compared
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Zoya Fedorova, 123RF.com
not be suitable for your website. Open source competitors such as Joomla [3] and Drupal [4] attract users with interesting and unique selling points. If you want to set up a website for a new product
17%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
Tube, and if you have a LAMP (Linux, Apache, MySQL, PHP) server readily available on which to install Mutillidae II, there is a specific link [4] for immediate installation of the application. Also, a comprehensive
17%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
about packet sizes. Failing these choices, there's always my preference, the succinct tcpstat [4], which will report on protocol data with a command as simple as: tcpstat -i eth0 One of these packages
17%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
became available in March 2008, and the bug fix version 1.4, which became available in the summer of 2008. Both of these versions offered experimental support for Python scripts and the ability to right
17%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
for each user on the system that will contain the user's fingerprint. The command is tf-tool --add-user username (Figure 4). Users must scan their fingerprints three times for this to work
17%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
/inet/ike/config for the same partner would look something like Listing 4. Listing 4: /etc/inet/ike/config 02 p1_nonce_len 20 03 p1_xform { auth_method preshared oakley_group 2 auth_alg sha encr_alg 3des } 04 p2_pfs 2 05 { 06
17%
Exploring PowerDNS
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © ladyann, 123RF.com
and records DNSSEC support (as of 3.x) Web-based management options DNS data stored in plain text (BIND compatible) IPv4 and IPv6, UDP/TCP, 100% compliant [3] MySQL, Postgre
17%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
known as Polaris. Polaris included 80 simple cores and achieved a performance of 19.4GFLOPS per watt with a total capacity of 400GFLOPS. Just for comparison’s sake: The then state-of-the-art Core 2 Quad

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice