Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (249)
  • News (4)
  • Article (3)
Keywords

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Next »

9%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
available as version 0.0.2 [8] (see the "Stresstest" box). Figure 1: Stresstest stresses SMBTAD by continually generating Samba traffic
9%
Kali Linux 2025.3 Released with New Hacking Tools
30.09.2025
Home »  News  » 
 
to the images are now part of the virtual machine build scripts, and those scripts have also been upgraded to the Packer 2.0 standards. As far as the new hacking tools are concerned, you get Caido and Caido CLI
9%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
smartphone users, which was 2.9 per 1,000 smartphone users in 2011, is expected to climb to 4.0 in 2013." The Azaleos Managed MDM service provides device security management for lost, non-compliant, offline
9%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
patience and light scripting skills. PowerShell versions 1.0 and 2.0 have a somewhat limited ability to grab information from remote systems singly or in bulk. Therefore, you have to work around those
9%
Better Active Directory with Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Sattapapan Tratong, 123RF.com
virtualization of domain controllers. And, making snapshots of domain controllers is no longer a problem either (see the article on Hyper-V 3.0 in this issue). VMware and other virtualization vendors likely
9%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
a DNS server, it uses three standard addresses as its name servers: fec0::1, fec0::2 and fec0::3. The prefix fec0 was originally the counterpart to the RFC 1918 addresses but has been deprecated. If you
9%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
12 The monitor is set up by /etc/opennms/poller-configuration.xml: 13 14 ... 15 17
9%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
], which can yield a surprising number of vulnerabilities in a short amount of time. Many of the best "smart" (protocol- or format-aware) fuzzers, such as Sulley [11] or Peach [12] are well documented
9%
Nagios author Ethan Galstad
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
of Nagios and I released it. Honestly, I didn't think more than 10 or 12 people would use it. I didn't think anyone would find it interesting, but it started taking off and becoming very popular, and that
9%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
how to set some of the parameters for the standard Ethernet interface (IP address 10.10.1.20, subnet mask 255.255.255.0, default gateway 10.10.1.1, DNS server 10.10.1.254). To discover the name

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice