Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub%25253%2525A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (96)
  • Article (32)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13

15%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
protocols, for example, http-brute, oracle-brute, and snmp-brute. default These are standard scripts that are used if you run Nmap with the -sC or -A options. discovery
15%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
described in this article: https://linuxnewmedia.thegood.cloud/s/9nFQcFb2p8oRMEJ pandas.DataFrame: https://pandas.pydata.org/docs/reference/api/pandas.DataFrame.html The Author Andreas
15%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
's with all the colons? Well, put simply, IPv4 addresses are short, so writing out the entire address is easy. With IPv6, however, you get something like 1.2.3.4.5.6.7.8.9.234.25.198.221.82.15.16. To make ... 3
14%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"RevisionId": "aa63-b5c0-4ec2-a5e99", 11 "MemorySize": 128, 12 "Version": "$LATEST", 13 "Role": "arn:aws:iam::XXXXX:role/bashFunctionRole", 14 "Timeout": 3, 15 "Runtime": "provided", 16
14%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
03736 bash zap@03736c2a2088:/zap$ x11vnc --forever --usepw --create Enter VNC password: Verify password: Write password to /home/zap//.vnc/passwd? [y]/n y Password written to: /home
14%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
, so the other must be the injected sidecar. A full description of one of these pods (Figure 7) shows that the Istio sidecar is indeed present: $ kubectl describe pod wordpress-77f7f9c485-k7tt9
14%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny
14%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
. The required modifications are explained in the Huginn wiki [3]. The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3

« Previous 1 ... 6 7 8 9 10 11 12 13

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice