Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (198)
  • Article (4)
Keywords

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 Next »

9%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
:external/ipmi 10 params hostname="bob" ipaddr="192.168.122.111" 11 userid="4STONITHonly" passwd="evenmoresecret" interface="lanplus" 12 op start interval="0" timeout="60" 13 op stop interval="0" timeout
9%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
-CERT [6]. I would recommend anyone doing work in the realm of ICS/SCADA systems to take this class. One day included a 12-hour exercise in which participants attacked (red team) or defended (blue team). I
9%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
to prefer Bcrypt instead. Web 2.0 applications that use Phpass very often allow you to modify these two settings either in the configuration file, or directly in the administration front end. You can
9%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
technologies. Besides Xen, KVM, and VirtualBox, Libvirt also supports OpenVZ, VMware ESX, and GSX. The nagios-virt [12] tool was written on the basis of this API and helps administrators configure host
9%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
], which can yield a surprising number of vulnerabilities in a short amount of time. Many of the best "smart" (protocol- or format-aware) fuzzers, such as Sulley [11] or Peach [12] are well documented
9%
Nagios author Ethan Galstad
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
of Nagios and I released it. Honestly, I didn't think more than 10 or 12 people would use it. I didn't think anyone would find it interesting, but it started taking off and becoming very popular, and that
9%
Quick patches with Ansible
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © David Crockett, Fotolia.com
_ssh_private_key_file: /home/treuss/.ssh/pihole 09 ansible_user: thomas 10 # Gitea 11 raspi03: 12 ansible_ssh_private_key_file: /home/treuss/.ssh/raspi03 13 ansible_user: thomas 14
9%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
to analyze I/O patterns is that you are getting the strace output from a single application. Because I'm interested in HPC storage here, many of the applications will be MPI [12] applications, for which you
9%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
] and extract WiFi passwords with hashcat [12]. Given the small size of the housing – Flipper Zero is just 10 cm wide and 4 cm high – it is not surprising that the performance of the integrated antennas
9%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
for exchanging experiences as well. And, if you want to stay on top of developments concerning Kanban while traveling, the "ITK Podcast" [12] is recommended. Infos Scrum: http

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice