Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (940)
  • Article (262)
  • News (42)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 125 Next »

19%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
. The command > msfpayload windows/exec CMD="cmd /k calc" EXITFUNC=thread C | sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- would format the parameter value for -ShellCode correctly in the example here
19%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
with the arrival of VMware [1], KVM [2], and Hyper-V[3], because virtualization makes it easy to jump-start new computers. New computers nearly always require an IP address and network integration. In the past
19%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
Some people consider container systems like Docker [1] a new form of virtualization – a natural continuation of KVM [2], Xen [3], VMware [4], Hyper-V [5], and the Zones concept in Solaris [6
19%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
of the European Union are protected by Directive 95/46/EC [2], due to be updated for the digital age [3], with supplemental legislation in individual member countries (e.g., the Federal Data Protection Act
19%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
 ~ # cd /etc/audit/ chrisbinnie audit # ls auditd.conf  audit.rules  rules.d   chrisbinnie audit # ls -al total 20 drwxr-x---  3 root root 4096 Dec 16 12:34 . drwxr-xr-x 95 root root 4096 Dec 16 12:34 .. -rw-r-----  1 root
19%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
.conf audit.rules rules.d chrisbinnie audit # ls -al total 20 drwxr-x--- 3 root root 4096 Dec 16 12:34 . drwxr-xr-x 95 root root 4096 Dec 16 12:34 .. -rw-r----- 1 root root 701 Dec 9 2014 auditd.conf -rw
19%
Windows Server 2012 Tricks
27.05.2013
Home »  Articles  » 
 
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick 3: Virtual Domain Controller – Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
19%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before
19%
The 12 best tricks for Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Graphic Designer, Fotolia.com
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick 3 Virtual Domain Controller -- Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
19%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
and performance of the user’s workload, I don’t see a problem using it. Example 3: Setting Temporary I/O Directories Very close to the previous example is one that creates temporary directories for the user

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 125 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice