Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1562)
  • News (445)
  • Article (316)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 182 183 184 185 186 187 188 189 190 191 192 193 194 195 ... 234 Next »

12%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
on the LAN, the DHCP server can also provide information about Active Directory (AD), the time servers, or other information. If a boot server for PXE resides on the network, DHCPOFFER sends both the server
12%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
transparent login to more Kerberos services. Before this can happen, however, the user must initially prove their identity to the KDC. This process is also known as pre-authentication and provides protection
12%
The weak spot of SBCs
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Lucy Baldwin, 123RF.com
An omnipresent characteristic of current single-board computers (SBCs) is the use of SD cards to provide mass storage functionality, either for system boot or data storage purposes. Unfortunately
12%
Passkeys eliminate the need for password-based authentication
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Olivia, Fotolia.com
. Once the response provided by the device is validated, the user is considered to be logged in. Although this sounds complicated, it all takes place under the hood. The user only has to navigate
12%
Pentest your web server with Nikto
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mike Wilson on Unsplash
provides the options. To test for SQL injection only, run the command ./nikto.pl -url example.com -Tuning 9 You can also exclude individual tests. Assuming you want to check everything except SQL injection
12%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
such data confidentially and verify its integrity on recovery. Encrypted backups or routinely encrypted older files in an archive primarily provide protection against a potential attacker copying large
12%
Load test your website with Siege
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Aarón Blanco Tejedor on Unsplash
be sure you have administrative access to your system. In this article, I provide instructions on how to use the Siege benchmarking tool to stress test a website hosted on an Ubuntu 20.04 server. Why Care
12%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
you against ransomware attacks. As a preventive measure, employees should not open any attachments from unknown senders. Recipients of such email messages should check the sender information provided
12%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
to the corresponding computers on your private network. The raw and security tables are used far less frequently and provide functionality to prevent connection tracking or to mark packets in SELinux contexts. Each
12%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
, but the concept is very similar to, for example, Microsoft authentication, where you need to have a user account and permissions to access any resource on the network. Cloud providers have an extensive selection

« Previous 1 ... 182 183 184 185 186 187 188 189 190 191 192 193 194 195 ... 234 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice