Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e100】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 216 Next »

42%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
vulnerabilities. If you don't want to fire OpenVAS at your servers, you can use the leaner Lynis [3]. The tool runs more than 200 tests and after a few minutes presents its report in the terminal or by email
42%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
Kerberoasting Targets Finding worthwhile Kerberoasting targets is easy. Attackers use tools such as Python scripts (one popular example being GetUserSPN.py from the Impacket project [2], which runs on a Linux
42%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
. The ability to create snapshots with running guest systems is also supposed to be possible. Fedora provides both Eucalyptus 3.2 as well as OpenStack "Folsom" for setting up clouds; Red Hat has been involved
42%
SUSE Linux Enterprise 11 SP3 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mario_Paufler, 123RF.com
on physical hardware. The full virtualization option is not available if you run the setup program on a virtual machine, or if the installer has found no CPU virtualization features (Figure 5
42%
Alternatives to Google Analytics
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Vasilii Shestakov, 123RF.com
having their surfing habits recorded by rejecting the transfer of data to Google Analytics before visiting an Internet site. This is done in the form of a small browser add-on that prevents running ... Many companies that use Google Analytics to learn more about visitors to their websites worry about privacy issues. We looked at some useful alternatives. ... Alternatives to Google Analytics
42%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
that network and necessarily feeds the VPN revenue stream. However, rebuilding your infrastructure to implement a zero trust concept will pay off in the long run with less complexity and higher effectiveness ... Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles
42%
Clustering with the Nutanix Community Edition
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Beau Runsten on Unsplash
). The computer has two disk drives – one 512GB and one 1TB SSD – and an eighth generation quad-core Intel Core i7 8559U processor running at 2.7GHz. Therefore, the machine is not totally up-to-date but is still
42%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
stores the data there. That aside, the BadUSB function is easy to use. Starting at the Main Menu, choose Bad USB , select the payload script, connect the device to the laptop, and Run the script. Flipper
42%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
with the Zebra Routing Daemon by Japanese developer Kunihiro Ishiguro [2]. The software is included in all popular Linux distributions and also runs on Unix derivatives like Solaris and Free/Net/OpenBSD. Quagga
42%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
the chance to make a contribution. Some excerpts from the story are shown in Figures 2 to 5. At first, everything is running perfectly. The developers have already passed Project A on to Deployment

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice