Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (294)
  • Article (11)
  • News (7)
Keywords

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 32 Next »

45%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
with the user command. To grant the user specific rights, you can run the permission grant command and modify rights accordingly. Instead of assigning rights to individual users, you can assign users to specific
45%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
restrictions do apply here (more on that later). Before you can integrate Phpass with your own application, however, you should take time to look at how it works. Hash Me! Phpass runs every password passed
45%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
(Listing 3). Listing 3 OpenLDAP Process Example Service identification (/etc/opennms/capsd-configuration.xml): 01
45%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
45%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
Openwall's website. John the Ripper is a command-line utility that does not require administrative or root privileges to run against a password hash file. However, you will need administrative privileges
45%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
distro's package manager. SourceForge [2] has project information as well as the code. Tcpdump runs locally on your machine and can read or write network traffic information to a file. A basic capture
45%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
the Dynamically update DNS A and PTR records for DHCP clients that do not request for updates (e.g., clients that are running Windows NT 4.0) option in the DHCP server properties. This option is necessary because
45%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
processor under a unified technology that transparently assigns work to the correct processor. With Maximus-enabled applications, GPU compute work is assigned to run on the NVidia Tesla companion processor
45%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
(Figure 4). You will definitely need to enter some settings here for live migration if you run Hyper-V in the cluster – especially when you activate the operating system; otherwise, you will continually
45%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
Shell, running some basic Get commands, and using the Help system. Then, I showed you how to control services, processes, and commands on local and remote systems. In this article, you'll discover the power

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice