Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1036)
  • Article (307)
  • News (201)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 155 Next »

16%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
's standards. TCP includes the SMTP protocol for email and HTTP/1.1 and /2.0; therefore, all TCP stack optimizations have a positive effect on performance. In this article, I take a look at the TCP initial
16%
Logical Bombs for Fun and Benchmarking
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
://elixir.bootlin.com/linux/v4.15/source/mm/oom_kill.c Linux memory management: https://linux-mm.org/OOM_Killer The Author Federico Lucifredi (@0xf2) is the Product Management Director for Ceph Storage at Red
16%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
to recover the encrypted files. Once the encryption process is complete, Locky stores a ransom demand and also sets up a desktop background with a ransom demand. It requires the victim to pay a ransom of 0
16%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
monitoring endpoint, users can access these metrics: [SERVICE] http_server On http_listen 0.0.0.0 http_port 2020 With the server enabled, visiting http://:2020 offers
16%
What's new in Samba 4
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Natalia Sheinkin, 123RF.com
. The security domain and DNS are inextricably linked in a way that was not true with Windows NT 4.0 (NT4) domains. Changing to or creating an Active Directory domain almost certainly means the architecture
16%
The simpler alternative to cron: Whenjobs
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© stillfx, 133RF.com
to a variable to trigger a change event, you can additionally set the --whisper option: whenjobs --set free_space=0 --whisper Whenjobs shows you which jobs are active when you stipulate the --jobs parameter
16%
Software-defined networking with Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Kirill Cherezov, 123RF.com
Shell. However, to work, support is required from the respective hardware manufacturer. The software components in Windows Server 2016, which work directly with the Network Controller, already support PowerShell 5.0
16%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
value drops to 9.0, but the rating remains unsafe. The next step is to add RestrictNamespaces=uts ipc pid user cgroup to the unit file, which prevents the process from accessing the listed namespaces
16%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
the penetration testing tool with a reference to the network nodes on which the vulnerability exists. For the sample data populated for new users, the web server on 10.0.155.160 is affected. The tabs for CVSS
16%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
. Further details for each change follow this summary. If you automate the use of AIDE, you will definitely need to evaluate the program's return values. Like (virtually) any application, a return value of 0

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice