Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (191)
  • Article (77)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 27 Next »

18%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
use generic-service 21 host_name w2k12srv 22 service_description Memory Usage 23 check_command check_nt!MEMUSE!-w 80 -c 90 24 } 25 define service{ 26
18%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget
18%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
, it is already in the /etc/apache2/ports.conf file; openSUSE 12.3 uses /etc/apache2/listen.conf, and on CentOS it's in /etc/httpd/conf.d/ssl.conf. If necessary, remove the hash signs (#) that comment out
18%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
if z(i) depends on a previous value, as in the following: do i = 2,n z(i) = z(i-1)*2 enddo As written, you can't generally parallelize the loop because of data dependency [4]. This dependency
18%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real
18%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
install kopano-webapp # exit ### If you have the Community Packages $ wget https://download.kopano.io/community/webapp%3A/webapp-4.2.2860%2B1697.1.12a4e21-Ubuntu_18.04-all.tar.gz $ tar xfz webapp-4.2.2860+1697.1.12
18%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"RevisionId": "aa63-b5c0-4ec2-a5e99", 11 "MemorySize": 128, 12 "Version": "$LATEST", 13 "Role": "arn:aws:iam::XXXXX:role/bashFunctionRole", 14 "Timeout": 3, 15 "Runtime": "provided", 16
18%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
[laytonjb@n0001 ~]$ module avail ------------------------------- /opt/Modules/versions ------------------------------ 3.2.9 --------------------------- /opt/Modules/3.2.9/modulefiles ... Warewulf Cluster Manager – Part 3
18%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
18%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
SeverityValue = 3; else $SyslogSeverityValue = 6; 20 21 # The name of the file is also sent with the file 22 Exec $FileName = file_name(); 23 24 # The SourceName variable is set by default to 'NXLOG'. To send

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice