Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (284)
  • News (10)
  • Article (8)
Keywords

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 31 Next »

9%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
specified IP addresses and demand a password, but for simplicity, my .htaccess looks like the following: Order Deny,Allow Deny from All Allow from 12.12.12.12 Allow from 23.23.23.23 Allow from 34
9%
BlackHat USA 2010
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
. In the case of SSL certificates, they scanned the Internet and found 1.2 million SSL-enabled websites [3] [4]. Among the problems found were certificates for reserved addresses (e.g., 192.168.1.2, a reserved IP
9%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
12.10 as a storage option for our OpenStack reference architecture … ." The Ceph open source distributed storage system combines object storage, block storage, and a Posix-compatible filesystem
9%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
/400 $5.63 https://thepihut.com/products/sleeve-for-raspberry-pi-400 Raspberry Pi 27W USB-C power supply $12.83 https://thepihut.com/products/raspberry-pi-27w
9%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
are missing, potential causes include invisible SIP traffic, incorrect selection of the network interface, or missing permissions. Your first step is to check whether SIP traffic exists sudo tcpdump -i eth0
9%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
management engine with power optimization software, all on one piece of silicon. The EnergyCore SoC also includes a full complement of server I/O features and a large 4MB ECC L2 cache. To learn more, visit
9%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
desktop license provides access to process mining on desktops and 50MB of process mining data storage, which can be expanded to up to 100GB per tenant. Power Automate Premium also provides AI tools
9%
OpenSSL 3.5 Released
24.04.2025
Home »  News  » 
 
-party QUIC stacks including 0-RTT support. Support for multiple TLS keyshares and improved TLS key establishment group configurability. OpenSSL 3.5 is a long-term stable (LTS) release
9%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
9%
SUSE Offers Cloud Sovereignty Framework Self Assessment
05.02.2026
Home »  News  » 
 
organizations quickly see how their infrastructure measures up against the 2025 EU Cloud Sovereignty Framework, providing an analysis that includes: Overall sovereignty score (0-100%) Individual scores

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice