Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (312)
  • Article (8)
  • News (4)
Keywords

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 33 Next »

17%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker
17%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
a firewall). A large number of plugins [4] already exist for various styles in Nagios and Icinga. But before the first check, the administrator needs to configure the computers and the services to monitor
17%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
dependence on any one service provider. Emerging standards, stacks, and API frameworks for cloud computing, such as OpenNebula [3] or Deltacloud [4], are a big help. The Admin Cloud Index The Admin Magazine
17%
Windows Performance Toolkit and System State Analyzer
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ewa Walicka, fotolia.com
download for free [1]. To run the tools, you will need .NET Framework 4 [2]. If you want to investigate Windows 7 or Windows Server 2008 R2 with the tool, you will need Windows Performance Toolkit 4.7, which
17%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
disclosures (see Figure 4). Figure 4: Finding potential users and path disclosures. Information Tools on the Internet Instead of employing built
17%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
], Fabric [3], or Capistrano [4], MCollective relies on middleware based on the publish/subscribe method to launch jobs on various nodes. The middleware supported by the framework can be any kind of STOMP
17%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
, and click the checkbox next to Enable X11 forwarding (Figure 4). In the left pane of PuTTY's Configuration, select Session and click the Save button to save these changes
17%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
with Adobe Lightroom and other tools. A large collection of scripts is available online at the Nmap.org website [4]. Some of these scripts are also bundled with the Nmap application. The ls command will give
17%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
watches for modifications to sshd_config (Listing 4). Listing 3 Running Puppet Agent Execution [Unit] Description=Run Puppet apply when sshd_config is modified [Service] Type=oneshot Exec
17%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
and setup of DNF is a breeze: You can use the dnf_aixtoolbox.sh script (from the AIX Toolbox PPC repository [4]). With this script, DNF is automatically configured to use the existing IBM AIX Toolbox

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice