Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (409)
  • Article (51)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 46 Next »

25%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
/index.jsp Filr download page: https://www.novell.com/products/filr/novell_filr_download.html Filr documentation: http://www.novell.com/documentation/novell-filr1/ Novell Filr 1.0 Web Application User Guide ... Novell Filr 1.0 tested
24%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
to port 22 (i.e., the SSH port). Simple Mail Transfer Protocol (SMTP) ports 25 and 587 should be open. If you also intend to operate with Internet Message Access Protocol (IMAP) on the system, you need ... If you don't want to hand over your mail to a corporation, you have to operate your own mail server. Securing it sensibly involves some effort.
24%
Admin as a service with sysstat for ex-post monitoring
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Levente Janos, 123RF.com
calculated values for load average. Ex-Post Analysis In this article, I focus on accessing ex-post data (i.e., the state of a system in the past). To access the data for the last two days, sar offers the -1 ... The top, vmstat, and iotop monitoring tools for Linux show the current situation but do not provide any information about the past – which is where sysstat comes into play.
24%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
diodes (Figure 1) to ensure downward compatibility. One is responsible for playing back (and recording in the case of burners) CD and DVD media; the other ensures compatibility with Blu-ray media ... We test two candidates for viewing and converting video DVDs and Blu-ray discs, HandBrake and MakeMKV, and point out legal hurdles.
23%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
, a j value of 1,671,723,848 is already far beyond the last item in the vacf array, so the vacf[j-i] = 0 statement is trying to write at address 0xd49039e0. Because this address is far beyond the process ... Kernel and compiler security techniques, together with sound programming practices, fend off memory corruption exploits.
23%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
). Figure 1: An OpenStack standard setup uses at least four networks, each of which has a special role to play. The management network is the network that the physical servers in the Open ... The first article in this workshop looked at the theory behind OpenStack; the second part takes a more hands-on approach: How can you set up an OpenStack cloud on a greenfield site?
23%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
e37654:disk-0 iqn.2008-02.com.f-response.cr0wn-d00e37654:disk-1 iqn.2008-02.com.f-response.cr0wn-d00e37654:vol-c iqn.2008-02.com.f-response.cr0wn-d00e37654:vol-e iqn.2008-02.com ... Be ready before disaster strikes. In this article we describe some tools you should have on hand to obtain a memory image of an infected system.
21%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
to, say, /dev/vtbd0 and /dev/vtnet0, which means adjusting the /etc/fstab file to match. Figure 3 shows the typical kernel boot messages. Listing 1 Virtio in /boot/loader.conf #Init Virt ... The Unix-like FreeBSD is viewed as highly reliable and forms the underpinnings of both Mac OS X and the Sony PlayStation 4. Version 10 introduces new features and performance gains.
20%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
. CMMC in Depth CMMC is currently on its second iteration, CMMC 2.0. The prior iteration of CMMC was CMMC 1.0, which built a framework of four elements: security domains, capabilities, practices ... risk and keep information out of the hands of adversaries.
20%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
system, and two parameters can be manipulated by the root user from within the jail. The flags are set using sysctl: sysctl -w $MIB=0 or sysctl -w $MIB=1 Using sysctl $MIB lets you ... With IT security playing an increasingly important role, one feature in FreeBSD deserves special attention: jails. In this article, we shed some light on the extra level of security that jails

« Previous 1 2 3 4 5 6 7 8 9 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice