Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 189 Next »

10%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
Eye 5. NetWiredRC 6. Timba 7. Andromeda 8. Bandok 9. Corkow 10. Dofoil All of this suggests that MWI is deployed by many cybercriminals as an "exploits-as-you-need-them" malware creation service
10%
CloudStack Up Close
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
CloudMonkey and CloudStack were tightly coupled, but with Apache CloudMonkey 5.0.0, the CLI can actually query the API endpoint of the target cloud and automatically discover the capabilities
10%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
for administrative tasks, preferably one computer for each administrative account and for the activities to be carried exclusively by the linked account [5]. Account Management in Entra Microsoft sees the user self
10%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
. The developers recommend using their official Docker container, which only requires around 30MB of RAM [5]. Authelia is also designed for operation in Kubernetes. You can start several containers in parallel
10%
Encrypting DNS traffic on Linux with DoT
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Alexander Grey on Unsplash
the knot-utils package belonging to the Knot DNS server [5] also lets you display the DNS server's certificate chain in full, which can be helpful for troubleshooting if you are having problems with the TLS
10%
Sustainable Kubernetes with Project Kepler
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Hassan Pasha on Unsplash
Chromebox with Skylake architecture – gives the results shown in Figure 4, which is an approximately 12.5W power increase over a six-minute period, or 0.49g of CO2. This setup at least shows that you get more
10%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
multiple ARP replies posing as the target machine and convince the originator of the connection to create a connection with it instead of the correct computer. This deceit is known as ARP spoofing [5
10%
Discovering device names
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© cbpix, 123RF.com
is typically given the defined name, such as eth. Here's an example: # grep eth0 /etc/udev/rules.d/70-persistent-net.rules SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="f0:de:f1:d5:c1
10%
Migration from LDAP to FreeIPA
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pier paolo gentili, 123RF
LDAP and Kerberos interface. Here the classic PAM and NSS libraries (pam_krb5 and nss_ldap) enter the scene. In this case, the advanced features of SSSD, such as caching account information
10%
Nagios alerts implemented via VoIP
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Zentilia, 123RF.com
if [[ ! -f /tmp/caller.lock ]]; then 21 touch /tmp/caller.lock 22 locked=true 23 else 24 sleep 5 25 fi 26 done 27 28 # Generating the message 29 $TEXT2WAVE -o $SOUNDFILE -f 8000

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice