Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 171 Next »

23%
Azure Application Gateway load distribution tool
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © foodandmore, 123RF.com
balancers in Azure include: Azure Load Balancer, a Layer 4 service that works for TCP and UDP applications; Azure Front Door, a global Layer 7 load balancer particularly suitable for users from
23%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
available for management. Unfortunately, the IceWarp mail server does not support PowerShell commands. Like Exchange, IceWarp also supports autodiscovery for mail client configuration (Figure 4). Users need
23%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
, or retrieving information on database schemas (Figure 4). Figure 4: Risk profiles give administrators a granular approach to defining which database operations
23%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
). The possible payload options are Meterpreter, Shell, or VNC. Meterpreter is a collection of functions that you can run on the system (Figure 4). Shell gives you a system shell on the hijacked server, and VNC
23%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
-known cryptographer Bruce Schneier thus proposed ending the competition without a winner a couple of weeks before the final decision [4]. None of the finalists was considerably better than SHA-512; some were slightly
23%
Living with multiple and many cores
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
these designs. The increase in frequency or "megahertz march," as it was called, started to create problems when processors approached 4GHz (109Hz, or cycles per second). In simple terms, processors were getting
23%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
. The component is found in the right-hand menu under the Processing option. Afterward, you should connect the components as before (Figure 4). This sets up the path for the data from the input CSV file
23%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
if the cluster at the cloud provider's end will be on-demand only. Like the deployment, you also need to roll out the service as a FederatedService, if you use it. Listing 4 shows the service for deployment from
23%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
a meaningful text. Although the conventional key pair I created with ssh-keygen in Figure 1 still exists, the tool in Figure 4 generates a variant optimized for security keys. You need to both enter a PIN
23%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
. Mitmproxy forwards the request to the server through the connection initiated in step 4. This simplified process sequence shows the sophistication of the actions performed by mitmproxy just to slip

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice