Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 216 Next »

42%
Help Desk with FreeScout
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Nik on Unsplash
with a predefined docker-compose.yml configuration file in the examples folder. You just need to populate the file with the required environment variables and credentials and then run it. That said, installing
42%
Controlling Amazon Cloud with Boto
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Claudiarndt, photocase.com
instance in the web console, which also includes a search function. The following function launches the smallest Amazon instance on offer using the ami-df9b8bab image: conn.run_instances('ami-df9b8bab
42%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
Sqlmap has detected that the password hashes are located in the password table; the program can then run a dictionary attack against them. A few seconds the attack executes, Sqlmap reveals the clear text
42%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
. The Test Setup The lab setup consisted of a client with Ubuntu Linux 16.04 LTS connected to two storage servers with plenty of hard disks (Table 1). The operating system running on the file servers was Cent
42%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
cases, network services are not disrupted by the attack. Services continue to run normally while the attacker accesses the traffic between the client and the server. Identity theft, faked transactions
42%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
with the user command. To grant the user specific rights, you can run the permission grant command and modify rights accordingly. Instead of assigning rights to individual users, you can assign users to specific
42%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
restrictions do apply here (more on that later). Before you can integrate Phpass with your own application, however, you should take time to look at how it works. Hash Me! Phpass runs every password passed
42%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
(Listing 3). Listing 3 OpenLDAP Process Example Service identification (/etc/opennms/capsd-configuration.xml): 01
42%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
42%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
Openwall's website. John the Ripper is a command-line utility that does not require administrative or root privileges to run against a password hash file. However, you will need administrative privileges

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice