Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (76)
  • Article (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 Next »

14%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
"SubnetMax": "10.99.0.0", 07 "Backend": { 08 "Type": "udp", 09 "Port": 7890 10 } 11 } 12 [...] At first glance, this concept looks robust and simple
14%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
14%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
- sl plugin for Scientific Linux 09 10 Available platform plugins: 11 - vmware plugin for VMware 12 - ec2 plugin for Amazon Elastic Compute Cloud (Amazon EC2) 13 - virtualbox plugin
14%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15 encryption_algorithm aes256; 16
14%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"TracingConfig": { 17 "Mode": "PassThrough" 18 }, 19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc", 20 "Description": "", 21 "CodeSize": 432, 22 "FunctionArn": "arn
14%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
://activemq.apache.org/schema/core http://activemq.apache.org/schema/core/activemq-core.xsd 07 http://activemq.apache.org/camel/schema/spring http://activemq.apache.org/camel/schema/spring/camel-spring.xsd"> 08 09
14%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-256-cbc; 07 } 08 policy pfs2-aes256-sha1 { 09 perfect-forward-secrecy { 10 keys group2; 11 } 12 proposals aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind
14%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
public_key = "${file("${var.ssh_pub_key}")}" 07 } 08 resource "digitalocean_droplet" "mywebapp" { 09 image = "docker-16-04" 10 name: guest 11 region = "fra1" 12 size = "512mb" 13 ssh
14%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
to the screen (STDOUT; line 15). Listing 1: SSH Script 01 #!/usr/bin/php 02 22); 05 ssh2_auth_password($ssh, 'khess', 'password'); 06 $stream = ssh2_exec
14%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
-Specific PATH 01 PATH=/bin:/usr/bin:/usr/local/bin 02 case `uname -r` in 03 IRIX*) 04 PATH=$PATH:/etc/:/usr/bsd 05 ;; 06 HP-UX*) 07 PATH=$PATH:/sbin 08 ;; 09 ... 10 esac

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice