Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (1)
Keywords

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 29 Next »

56%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
. Temporary workers without IT skills can put in useful work after a short introductory session. Infos readpreprompt: http://www.kev.pulo.com.au/readpreprompt/ Article code: http://www.admin-magazine.com
56%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
282: http://www.python.org/dev/peps/pep-0282/ A logging system for Python: http://www.red-dove.com/python_logging.html Logging facility for Python: http
56%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
. Once you have delivered the Word document to your intended victim, make sure you have the Metasploit client listener up and running on the attack machine. Infos Metasploit: http://metasploit.com
56%
Securing AI model deployments with SELinux
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Kirsty Pargeter, 123RF.com
a more fine-grained balance between security and operational flexibility.   Infos SELinux Contexts – Labeling Files, Red Hat Inc.: https://docs.redhat.com
56%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
names as targets. Thus, you could launch a connection scan of ports 0 through 1023 in the lemon.com domain by entering nmap -sT -p 0-1023 www.lemon.com . To scan a whole network, enter the netmask
56%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
administrator settings Specify an existing mail user who you want to give administratorpermissions (optional): admin@example.com Writing main configuration file... done. Thank you for using Horde Groupware
56%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
Load Balancer One option for load balancing is the Galera Load Balancer (GLB), which you can install as follows: wget http://www.codership.com/files/glb/glb-0.7.4.tar.gz tar xf glb-0.7.4.tar.gz cd glb
56%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
at configuration maintenance and the practical implementation of these strategies in an existing infrastructure. Infos Microsoft Purview: https://learn.microsoft.com
56%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
to correct the path if you run a 64-bit system. It then has to be C:\Program files (x86)\openvpn\, again with double backslashes. Listing 4 client.ovpn (Windows) 01 remote myopenvpn.exmaple.com
56%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv3

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice