Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (31)
  • Article (18)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 Next »

28%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
\n\ Host\: %c\n\ Date\: $(date)\n\ " | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & Each time a running service port is probed, you can do far more than just logging
27%
Elastic Beanstalk
29.10.2013
Home »  Articles  » 
 
a little more fiddly than with other PaaS offerings. Setting Up the Environment You need the eb CLI tool, which you unzip somewhere (e.g., ~/bin/eb/ ), then change your path to include the path to eb
27%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
MPIs). I built Remora with the command, REMORA_INSTALL_PREFIX=/home/laytonjb/bin/remora-1.8.2 ./install.sh which installs to a directory in my home account. If more than one user is to have access, you
27%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
. Rooting Android Because Google has overturned the popular Linux architecture, anyone who needs to do a little more on an Android device than Google allows first needs root access. Root access is not always
27%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
are necessary. Monitoring network throughput and latency is essential for identifying networking issues that could affect performance or user experience. Additionally, keeping track of the number of running
27%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
and the package manager. One really obvious (but rarely successful) trick is to look for writable SUID/GUID files. SUID (Set User ID) files execute with the privileges of file owner, rather than the user
27%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
RR can be removed as soon as its DNS time to live (TTL) has expired. Listing 2 Fingerprint in the TLSA RR $ dig TLSA _25._tcp.mail.sys4.de +short 3 0 1 9273B4E9040C1B9EE7C946EFC0BA8AAF2C
27%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
: - Architecture: x86 InstallerUrl: https://github.com/krwittmer/ficl-win-setup/raw/main/4Debug/FiclSetup.msi InstallerSha256: 1EE67FC17B0F38EF50CD1BEEDA9E12355DC8F98B5E2FD9D4D1403BAFC0DAF6BA ManifestType: installer
27%
SmartOS as a virtualization platform
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Paulus NR, 123RF.com
e-disk0@image | gzip > centos6.5.zvol.gz A complete VM template is nothing more than a compressed image, together with a file containing the metadata – again in JSON format. An example
27%
AWS Elastic Beanstalk
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Aleksandra Glustsenko, 123RF.com
it becomes a little more fiddly than with other PaaS offerings. Setting Up the Environment You to unzip the eb CLI tool [2] somewhere (e.g., ~/bin/eb/), then include the path to eb: export PATH=$PATH:~/bin

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice