Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (133)
  • Article (1)
Keywords

« Previous 1 ... 6 7 8 9 10 11 12 13 14 Next »

37%
Identifying and using software licenses
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © alphaspirit, 123RF.com
) [1] and the Open Source Initiative (OSI) [2]. A distinction can essentially be made between copyleft, permissive, and public domain licenses. Copyleft licenses [3] oblige the licensee to publish any
37%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
configuration, you might want to test the device itself. To do so, scan a fingerprint by giving the tf-tool --acquire command (Figure 3). Then you can use tf-tool --verify
37%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
version with advanced capabilities is available for EUR 49. A feature list [3] specifies the differences between the free and pro versions. The terminal function supports anti-aliasing, fonts, and macros
37%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
seconds, for example: # nc -p 16000 -w 30 examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter: # nc -s 1.2.3
37%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
Since the Linux kernel 2.6.20 release in February 2007, the Kernel-Based Virtual Machine, KVM [1], has made much progress in its mission to oust other virtualization solutions from the market. KVM
37%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
but comprehensively documented [3]. It logs HTTP requests and gives administrators unrestricted access to the individual elements of a request, such as the content of a POST request. It also identifies attacks in real
37%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes. In simple terms, fail2ban [3] keeps a close eye on your
37%
Modern network diagnostics on Windows and Linux
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Nk Ni on Unsplash
refined by the -4 or -6 options to limit the results to IPv4 or IPv6 connections. The -f flag lets users specify an address family (e.g., inet for IPv4 and IPv6 or unix for Unix domain sockets), providing
37%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this, the topic is still largely overlooked and a huge amount
37%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
-click the packet details in the packet list to add protocol fields. The release of Libpcap 1.0.0 added the ability to define the buffer size for recording and to view JPG files directly in Wireshark. Version 1.6 ... An administrator can only gain useful insights from network analysis if they understand the underlying procedures and protocols. The new version of Wireshark, 1.6, formerly known as Ethereal, can

« Previous 1 ... 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice