Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 213 Next »

18%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
[1]. To create a jail, complete the steps shown in Listing 3. Listing 3 Creating a Jail 01 # mkdir -p /jail/www 02 # cd /usr/src 03 # make world DESTDIR=/jail/www 04 # cd etc 05 # make
18%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
and disabled separately (Figure 3). Figure 3: IceWarp support management of system services in the console. The management console or the web interface
18%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
were largely identical to the cores of the Pentium-S processors and communicated with each other via a high-speed network connection and four DDR-3 memory channels. Intel manufactured a few hundred SCCs
18%
Managing Office 365 in PowerShell
17.03.2014
Home »  Articles  » 
Lead Image © sellingpix, 123RF.com
can be found online. Make sure that you download the correct version for your setup – that is, 32-bit or 64-bit . You also need at least version 3.5.1 of the .NET Framework in place on your computer
18%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
as an option and then generate the hash, for example, with sha1sum for SHA-1: echo -n "magazine" | sha1sum This entry in the users file, ADMIN SHA-Password := "e3d5a52968cef277f476a78124d8e05f1d558953
18%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
since 2009 by GreenSQL LTD in Israel. Until version 1.3, GreenSQL was released under an open source license. Version 2 was released in 2012 under a proprietary license with a free Express version, which
18%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
addresses to connect /etc/hosts.allow , the file would simply look like this: sshd: 10.10.10.10, 1.2.3.4, 21.21.21.21 TCP Wrappers works nicely, even if you change the standard SSH port (it’s usually TCP
18%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
a management console (MMC) with the usual three-panel setup: the menu on the left, actions on the right, and content to reflect the context in the main window in the middle (Figure 3). The first overview shows
18%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
.168.1.250   See Figure 3 for a screen shot of Zenmap in action. Figure 3: Zenmap scanning host 192.168.1.250 with a quick, intense sweep. You can see from
18%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
) layer for the cloud, virtualizing the various hardware components and making them available through a standard API. The first OpenStack release (dubbed "Austin") became available October 22 [3]; The Open

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 213 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice