Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (281)
  • News (9)
  • Article (8)
Keywords

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 30 Next »

9%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Password = "YdhKKoy2Huq1CVHwIR" 05 Pid Directory = "/var/run" 06 Query File = "/usr/lib/bacula/query.sql" 07 Working Directory = "/var/lib/bacula" 08 } 09 10 Fileset { 11 Name = "Full Set" 12
9%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
.have_ssl() then 11 return false 12 end 13 return true 14 end The portrule in Listing 2 creates the variables svc.std and svc.ssl as associative arrays (lines 2 and 3) and then checks to see
9%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
; 05 06 public class HelloWorldSample 07 { 08 static async Task Main(string [] args) 09 { 10 await HelloWorldSample.Run(); 11 } 12 13 public static async Task Run() 14 { 15 using var scanning
9%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
with Linux Debian 5.0.7, Ubuntu 10.10, and openSUSE 11.3. If you don't use Linux, check out the "Other Operating Systems" box. Other Operating Systems If you do not use Linux, you'll need to find out
9%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
interface, which for a local installation is http://127.0.0.1:8338 with default access credentials admin: changeme! Initial Configuration Steps The Maltrail environment is configured in the maltrail
9%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
login -l | grep linus linus xguest_u s0 This means my son can log in like before; however, his account is now mapped by SELinux to the xguest user: $ id -Z xguest_u:xguest_r:xguest_t:s0 Access
9%
Remote VMware console without a browser
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Julia Burlachenko, 123RF.com
). Listing 1 Browser Plugins for VMware Server 2.0 $ pwd /usr/lib/vmware/webAccess/tomcat/apache-tomcat-6.0.16/webapps/ui/plugin $ ls build_doNotErase.txt vmware-vmrc-linux-x64.xpi vmware
9%
Link aggregation boosts securityand increases throughput
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© zentilia, 123RF.com
address to the target MAC address: Source MAC address: 0x0000A4F8B321 – The last byte is 0x21 (= binary 00100001); thus, the last three bits are 001. Target MAC address: 0X0000A2123456 – The last
9%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
display. But, the Iconia Tab A510 runs Android 4.0 Ice Cream Sandwich (ICS), which has been slightly customized by Acer to include a circular launcher. The front of the tablet features a 2Mpx camera
9%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
Size Used Priority 03 /dev/sda5 partition 4085756 52864 -1 The most common configuration is a dedicated swap partition (type 0x82), but you can use swap files hosted in a general

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice