Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (142)
  • Article (4)
Keywords

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 Next »

15%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
architecture. After creating a kernel module, copy it to the target system and launch it with staprun: staprun capt-io.ko If you want non-root users to load this kernel module, they need to be members
15%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
for global coordination of the DNS Root, IP addressing, and other Internet protocol resources http://www.ripe.net Europe, Middle East, Central Asia http://www.apnic.net Asia and Pacific region http
15%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
needs some configuration tweaks. To complete these changes, you need root access to the Unix systems with which you are working. To begin, edit the /etc/ssh/sshd_config file and set the parameters
15%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
the user to enter a name and password. At the end of the first section of the configuration, enter the following two commands chmod 750 /var/lib/samba/winbindd_privileged chown root:nogroup /var
15%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
the subdomain for the back end (api.example.net ), for the front end (rmm.example.net ), and for MeshCentral (mesh.example.net ). The wizard also prompts you for the parent root domain (example.net ) and wants
15%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
Shell custom passphrase generator: $Count=Read-host "Number of words" $Separator=Read-Host "Separator" $Content=Get-Content -Path "$PSScriptRoot\Wordlist.txt" $Phrase=Get-Random $Content -Count $Count $Phrase
15%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
in Docker with root privileges, but not in Podman; therefore, the Memcached container needs a persistent volume for the /home/memcache directory to run in Podman. (2) For Zulip to use HTTP behind a reverse
15%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
) or root objects that can be exploited for DCSync attacks can be found here. Nessus also evaluates the cryptographic controls in your AD environment, including insecure encryption algorithms and dangerous
15%
PipeCD for CI/CD
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Kazuo ota on Unsplash
down development. Additionally, large monolithic updates mean that errors and bugs cannot be immediately traced to a clear root cause. Testing does nothing to change this situation. If, after a major
15%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
tuning. I must note that optimization is always to be performed after a code is working correctly and deemed fit for purpose: Sir Tony Hoare's famous quote stating that "premature optimization is the root

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice