Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1267)
  • Article (320)
  • News (212)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 181 Next »

9%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
://127.0.0.1/dvwa/ vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="PHPSESSID=ce0aa7922720f3190bf9bbff7f24c434;security=low" --forms After a short while, SQLmap finds the matching ID field and asks
9%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
interface, which for a local installation is http://127.0.0.1:8338 with default access credentials admin: changeme! Initial Configuration Steps The Maltrail environment is configured in the maltrail
9%
CloudStack's Chip Childers
29.10.2013
Home »  Articles  » 
 
earlier this year. What better time to check in with CloudStack VP Chip Childers on the state of the project and the path ahead? Chip served as release manager for the CloudStack 4.0.0 and 4.1.0 releases
9%
Chive
17.04.2012
Home »  Articles  » 
 
to appreciate the state-of-the-art Web 2.0 environment for developing and managing SQL statements and databases. A more grateful audience, however, are administrators of CMS, CRM, and groupware systems whose SQL
9%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
of hardware architecture. As for your cloud-native needs, version 8.3 includes updated container images for Buildah and Skopeo, as well as Podman 2.0. With the Podman 2.0 release, developers can work
9%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
to encrypt data that is transmitted across a network between a client application and an instance of SQL Server. SQL Server on Linux supports TLS protocols 1.2, 1.1, and 1.0. Machine Learning Services
9%
Configuring complex environments
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Austin Neill on Unsplash
the starwars.yaml file, use: yq eval ".publication-year[]" starwars.yaml If you only want to know when the first movie was released, put an index on the first element of the list: yq eval ".publication-year[0
9%
Analysis tour with Binary Ninja
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Igor Kovalchuk, 123RF.com
the following code admin.c: #include int main(int argc, char **argv) { printf("Hello World!"); return 0; } You can compile the source code with: gcc -O0 admin.c -o admin The -O0 entry switches off
9%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
ID Connect or the somewhat older SAML (security assertion markup language). If you have the choice, the Keycloak developers recommend OpenID Connect, which is an extension of OAuth 2.0 and offers JSON web
9%
CloudStack Up Close
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
served as release manager for the CloudStack 4.0.0 and 4.1.0 releases. He is a principal engineer in the Cloud Engineering organization at SunGard Availability Services, where he is responsible

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 181 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice