Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (242)
  • Article (66)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 32 Next »

18%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.9 20 # user setup 21 user --name=example-user --password= --iscrypted --gecos="example-user" 22 # Disk partitioning
18%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
even added a command-line interface (CLI) with the feel of a commercial router, completing the free DMVPN router. Unfortunately, Brocade acquired Vyatta in 2012 and put it under a commercial license
18%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
, you should see the client config file ssh_config, which I'll get to a little later. If you've just installed the SSH server and want to be sure that it's listening, you can use the command lsof -i :22
18%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
and monitoring. You can thus centrally manage your virtual switches. Once the service is installed and set up, you can manage your networks with System Center Virtual Machine Manager 2012 R2 or 2016, as well
18%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
to the screen (STDOUT; line 15). Listing 1: SSH Script 01 #!/usr/bin/php 02 22); 05 ssh2_auth_password($ssh, 'khess', 'password'); 06 $stream = ssh2_exec
18%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
, 256-bit AES for Phase 1, and because it was unclear at the start of the test which implementation could handle which algorithm or PFS groups.  In Phase 2, I wanted to use AEA256, SHA1, and PFS2
18%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
192.168.2.0/24; 21 service any; 22 } 23 IPsec-policy pfs2-aes256-sha1; 24 } 25 } 26 } 27 } Again you can reuse the proposal and the policy. Assuming
18%
Performance troubleshooting on Microsoft SQL Server
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Anna, Fotolia.com
Server 2012, the OS should have at least 2GB of RAM available, or 4GB on a physical system with a large amount of RAM. In Hyper-V virtualization does the dynamic memory configuration comply with best
18%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
18%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
the following command when you get there: wget http://libguestfs.org/download/builder/fedora-19.xz The image is only 164MB in size, so the download is done quickly. Back in the main directory of the libguestfs

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice