Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1264)
  • Article (303)
  • News (207)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 Next »

15%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
sources, such as search engines, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.0
15%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.0 is released. After evaluating several systems, Mlmmj
15%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
a commandlet DLL. To do so, pop up a text window and navigate to C:\Windows\Microsoft.NET\Framework64\v2.0.50727. If you use a 32-bit system, you need to change directory to C
15%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
.g., A becomes 4, E becomes 3, O becomes 0, 1 becomes !, etc.), makes the password even more complicated and does not make it any easier to handle. For example, the Robbie Williams refrain Hell is gone and heaven
15%
Modern network diagnostics
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Paul Aniszewski, 123RF.com
that the system is running an outdated version of Windows or that PowerShell is not properly configured. In such cases, ensure that PowerShell 5.0 or later is installed and running. Windows updates generally
15%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
features only found their way into the software in AAP 2.0. Table 1 Ansible Automation Platform Objective To create, execute, and manage automation processes Manufacturer
15%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
properly. An existing backup script can be extended to include heartbeat in a curl command: curl --request POST --header 'Authorization: Key H0i_bj<...>' --header 'Content-type: application/json' --data
15%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
section checks permissions: print "File $ThisFile is not readable. Check permissions."; if ($> != 0) { print " You are not running as superuser."; } Finally, a plethora of sensible, neat
15%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
included for a tiny amount per month. Memory can be expanded by up to 20GB; each additional gigabyte above the basic offer costs EUR0.25 per month. So, for 20GB, you end up paying EUR5.50 per month. Posteo
15%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
vulnerability scanners have a predefined default port range set (e.g., from port 0 to 15000). System administrators should be aware of these default settings and ensure all necessary ports are scanned. False

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice