Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (179)
  • Article (1)
Keywords

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 Next »

52%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
on the properties of the file format. Pen testers can use a tool called Metagoofil [3] to help find metadata on websites. Metagoofil is an information-gathering tool designed for extracting metadata off public
52%
Operating system virtualization with OpenVZ
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© sculpies, Fotolia.com
package in Debian's unstable branch. To install type: sudo dpkg -i linux-base_2.6.32-10_all.deb linux-image-2.6.32-4-openvz-686_2.6.32-10_i386.deb Figure 3
52%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
, the financial services sector continues to be the most targeted industry sector for phishing attacks, with 38.1 percent of targeted attacks; it is followed by the payment services (21.5%) and retail (13.6
52%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
CentOS 5 to 6 would work – a procedure the release notes advise against – a virtual environment seemed like the prudent decision. The first step is to create a copy of the current system, which should
52%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
Pulp, you will find prebuilt RPM packages for Fedora, Red Hat Enterprise Linux, and CentOS [2]. You can access the source code via the Git repository [3]. After downloading the Yum repository
52%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
the .NET framework installer to the same location. Before installing your first agent, connect to the MMSOFT website [3] and set up your free account. Each agent installation requires you to enter
52%
Agile system management in large-scale environments with Func
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
bowie15, 123RF
/log/func/ Automating Installation with Cobbler If you want to automate the process of installing Func on all your systems, you can use Cobbler [3] kickstart profiles. The Cobbler configuration file has two separate ... 3
52%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
remove some of the cost issue by purchasing the 16GB model with WiFi and 3GB for US$ 629 (iPad 2). The original iPad similarly equipped costs about half that amount. Don't worry about the 16GB of space
52%
Automating Migration to openEuler
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Chris Briggs on Unsplash
JDK, Perl, or Python environment, chances are an in-place migration will work free of fuss. To see if the platform your service runs on is available, check Repology [3] to verify that openEuler has
52%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
-click the packet details in the packet list to add protocol fields. The release of Libpcap 1.0.0 added the ability to define the buffer size for recording and to view JPG files directly in Wireshark. Version 1.6 ... An administrator can only gain useful insights from network analysis if they understand the underlying procedures and protocols. The new version of Wireshark, 1.6, formerly known as Ethereal, can

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice