Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"425 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (259)
  • News (6)
  • Article (4)
Keywords

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Next »

27%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
, the financial services sector continues to be the most targeted industry sector for phishing attacks, with 38.1 percent of targeted attacks; it is followed by the payment services (21.5%) and retail (13.6
27%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
type of suboptimal file I/O is inefficient file access patterns. Our script [6] can help with the problem of unnecessary frequent and small reads and writes of data inside a file. In this article, we
27%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
(e.g., which you can use to read passwords in the scope of a pentest) are available for download from GitHub [5] [6]. Flipper Zero is designed for interaction with a smartphone. During the initial
27%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
of the infrastructure. For a first impression or in a small environment, Wazuh provides a virtual machine [6] that contains all services and appears at https:// after booting. Without agents, though
27%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
(Figure 6). Figure 6: Registered attacks on various ports of production systems at the University of Bonn courtesy of HoneypotMe. All told, some 3
27%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
and change to the Remote Macros tab. There, you can press a button to add a new command, type the command in the Command line, and even add an intuitive name (Figure 6
27%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
folder. To do so, right-click and choose Computer | Properties | Advanced System Settings | Environment Variables | System Variables , scroll down until you see Path (Figure 6), and click the Edit button
27%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
. Additionally, Torvalds integrated kdb, a front end for kgdb, into the standard version 2.6.35 kernel to support simple operations, such as reading and setting memory addresses, reading kernel messages
27%
Monitoring with Zabbix
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Les Cunliffe, 123RF.com
. To set up an action, click Configuration | Actions in the main menu, select the Triggers entry for Event source , then click on Create Action . The dialog in Figure 6 mainly expects a freely selectable
27%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
. The Icinga kernel is well and comprehensively documented and leaves no questions unanswered. Icinga also offers a plethora of useful gadgets, such as the status map (Figure 6) or the alert histogram (Figure 7

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice