Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 208 Next »

12%
Discovering device names
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© cbpix, 123RF.com
access the data from the PCI IRQ routing table. The dmidecode and biosdecode tools provide this information on request. Alternatively, the script in Listing 2 can help. Listing 2 Hardware Check
12%
Ubuntu Business Desktop Remix 12.04 LTS
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
 
this remix in version 11.10 with the aim of providing an Ubuntu counterpart to the enterprise desktop products by Red Hat and SUSE. In version 12.04, the Business Desktop Remix became the LTS standard
12%
Installing .NET on Linux
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © 36clicks, 123RF.com
. The Red Hat website provides interested users the option of obtaining a completely free subscription, a $0 subscription, for Red Hat Enterprise Linux. Once subscribed, you can register the Linux system
12%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
leaks. The same applies with end-to-end transmission between the eSIM provider's servers and the end device. Additional security is offered by a feature that only allows an eSIM profile to be decrypted
12%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
are yet left to provide additional security. A good compilation of all systemd options suitable for hardening services and that open up a wide field for further optimizations is provided in a description
12%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
are hidden away, for which outsourcing to external cloud providers is strictly prohibited. Internal security mechanisms are required to prevent access completely or to restrict lateral movement on the network
12%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
provider also delivers classic web pages over the same port. If you go to the Blocky website [4], you can download the sources, written in the Go programming language, and compile the project yourself
12%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
plugins to provide data from common penetration testing tools within the scope of the project, including add-ons for Metasploit, Nessus, Nikto, and Nmap. First Steps in the Container Of the various
12%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
it – regardless of the cookie in the web browser – and the user would then have to log in again. For reasons of user-friendliness, large providers in particular sometimes use cookies that last far longer. On Google
12%
Operating system images with bootc
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © alfazetchronicles, 123RF.com
Container images generally only provide the components you need to run a specific application inside a container and do not include a Linux kernel, a bootloader, firmware, or similar components

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice