Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (174)
  • Article (77)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 Next »

92%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
-test -s "test" For testing purposes, create a WPA-PSK network with the passphrase and record the traffic. With cowpatty, you can now try to decode the phrase. You'll be amazed: This too is often successful
92%
Best practices for secure script programming
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Jorge Fernández Salas on Unsplash
of the shell user permissions. The $UID and $USER variables can be used to analyze the permissions of the currently active user: if [ $UID = 100 -a $USER = "myusername" ] ; then cd $HOME fi Unfortunately
92%
Zero-Ops Kubernetes with MicroK8s
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
T), thanks to a binary of just 100MB. The perfect laboratory companion that offers immediate access to Kubernetes is the clever minikube [2]. Another distribution caught my eye recently when I was arriving
92%
Up close with SUSE Linux Enterprise 12
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © kasza, 123RF.com
integrated with libvirt and the system's virtualization management. The ubiquitous Docker is also in place and available as a technology preview; you can try out the Docker software, but for now, SUSE
92%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
, but you can always try out one of the other variants, such as one of the prebuilt images available for AWS or Azure. Intrusion Detection The motivation for using Security Onion is intrusion detection. You
92%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
the IP address shown in the browser with a port number of 9292. As shown in Figures 1 and 4, this would be http://100.95.102.77:9292 . You can now continue working on your web application in the normal
92%
Simplify integration of S3 storage with local resources
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Christopher Burns on Unsplash
tapes are also backed up by Amazon S3, whereas tape archiving takes place by AWS Glacier. Prerequisites and Setup If you want to try Storage Gateway, you need an AWS account. The gateway can
92%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
to try to fend off an attack with 100GBps bandwidth on a 1 or 10GBps link. Until a corresponding filter protects the internal infrastructure, the line is already overloaded. Although the attack does
92%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
. If many processes are trying to take up processor time, you need to install a faster processor. Optimizing RAM and Processor Cache Microsoft recommends processors with the largest possible L2 and L3
92%
Live migration of virtual machines with KVM
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © SV-Luma, 123RF.com
the /nfs directory with root privileges and write to it. You can then restart the NFS server or type exportfs -r to tell the server about the changes. If you now try to mount the directory from a machine

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice