Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 37 Next »

70%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
Kerberoasting an unattractive proposition for attackers. Infos Kerberoasting in the MITRE ATT&CK framework: https://attack.mitre.org/techniques/T1558/003/ Impacket GetUserSPN: https://github.com
70%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv3
70%
Up close with SUSE Linux Enterprise 12
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © kasza, 123RF.com
, the default filesystem will be Btrfs in the future – you can't say the SLES developers lack courage. Linux 3.12.26 is no longer the latest kernel, but it is an LTS version and thus the logical choice for SUSE
70%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
-o pe_start # vgcreate RaidVolGroup00 /dev/sdx # lvcreate --extents 100%VG --name RaidLogVol00 RaidVolGroup00 # mkfs -t ext3 -E stride=32 -m 0 -O dir_index,filetype,has_journal,sparse_super /dev
70%
Keeping the software in Docker containers up to date
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Michal Bednarek, 123RF.com
option 2 in their wildest dreams. Prebuilt Containers Those of you who don't want to build your Docker containers yourselves – as described in option 3 – might find a useful alternative in the Docker
70%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, as illustrated by the Colonial Pipeline case in the US [3]. Attackers apparently found valid account credentials for an employee on the Darknet, accessed the company's computer systems over a virtual private
69%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
: In smartctl database [for details use: -P show] ATA Version is: ACS-2, ATA8-ACS T13/1699-D revision 4c SATA Version is: SATA 3.1, 6.0 Gb/s (current: 6.0 Gb/s) Local Time is: Sun Aug 2 10:57:50 2020 EDT
69%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
by support from Linux Professional Institute Info [1] DebOps: https://debops.org [2] Ansible packages: http://docs.ansible.com/ansible/intro_installation.html [3] Pip: https://pypi.python.org/pypi/pip [4 ... Ansible is a simple and sensible automation solution, as long as you don’t need to spend a lot of time creating new roles and playbooks. DebOps is a convenient collection of Ansible playbooks
69%
Zarafa on the Univention Corporate Server
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Andres Rodriguez, 123RF.com
and an Ajax web GUI that is very reminiscent of Outlook. Enterprises might also need to invest in a server operating system, because Zarafa itself doesn't sell its groupware solution as an appliance (in
69%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
-popular Travis CI [3] or GitLab CI [4]), which integrates easily with tools you might normally use manually. These tools might be used for database hacking, penetration testing, open network port probing

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice