Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1267)
  • Article (320)
  • News (212)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 181 Next »

9%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
a step in the right direction. Authentication policies can, to a certain extent, help limit the attack surface for brute force. For example, a Tier 0 account cannot be blocked by a brute-force attack
9%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
openQRM to use (this is typically eth0). Then, openQRM creates the required MySQL database; the root password you defined for MySQL is needed during the install. Finally, you need to upload a valid
9%
PC over IP
03.09.2013
Home »  Articles  » 
 
and easily with the ping scan method (-sP ; Listing 1). Listing 1: IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0.190) Nmap
9%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
an integer argument, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments
9%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
machine or flood a network). Even from the default view, with iftop -i eth0 where -i declares which interface you want to monitor, you can simply press the f key to enter one of the many filters
9%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
be used at the same time. Listing 1 Displaying Keys 01 ;; ANSWER SECTION: 02 mozilla.org. 6074 IN DNSKEY 257 3 7 03 Av//szWRDSGz3g4JkiuQqws79YZ6nwxk0f9PF9MCQSYrRGd0f4
9%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments, like its Python
9%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
are certainly justifiable: Disable the unencrypted connection and enable the SSL-protected web server by adding the following lines to the /etc/ntopng/ntopng.conf file, --http-port=0 --https-port=443
9%
System Center 2012 SP1: What's new?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
snvv, 123RF
availability on request. In this way, all virtual servers can be centrally managed, whether they run locally or in the cloud. SCVMM SP1 or newer supports the new VHDX disks in Hyper-V 3.0 and Windows Server
9%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
-based interface that lets you adjust extensive settings. Listing 1 IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 181 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice