Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (153)
  • Article (65)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22

13%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
-a9c7-1c7ef74a9ba4 Blocks the use of copied or imitated system tools (preview) No c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb Blocks web shell creation for servers
13%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
_file | ACTIVE | +--------------+---------------+ 1 row in set (0.00 sec) Finally, confirm data encryption at rest with the strings command to view the encrypted output: $ strings /var
13%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
At":1370514701043,     "name":"Brick",     "description":"this is a brick",     "location":{"timestamp":1370514701040,"latitude":50.0,"longitude":0.0}}]% The properties are NoSQL-like, so if you’re familiar
13%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
that it locates: oops::000:100::/:/bin/sh This password file entry allows someone to log in as the root-equivalent user oops without a password: grep '.*:.*:00*:' /etc/passwd | awk -F: 'BEGIN {n=0}; $1
13%
Integrating FreeIPA with Active Directory
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © payphoto, 123RF.com
, klist Ticket cache: KEYRING:persistent:0:0 Default principal: mucuser@COE.MUC.REDHAT.COM displays the Kerberos tickets issued for the Windows user on the logged-on host. Considering or Ignoring POSIX
12%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
(KafkaProducerString, producer = new KafkaProducer(props)) { 03 04 for (long i =**0; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
12%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
.21 –   EUR5.95 EUR1.00 (with French VAT) EUR2.78 (half price as of year two) – $2.92 License(s) AGPL, commercial GPL, LGPL, AGPL Commercial GPLv3
12%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
a redundant power supply or hard disks. Its Intel Xeon 4110 processor has eight CPU cores and 32GB of RAM. Its bigger siblings, the SNS 3655 and SNS 3695, come with 12 CPU cores on the Intel Xeon 4116 CPU
12%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
. Depending on the manufacturer and the method used, a distinction is made between time-based or time-synchronized tokens, TOTP (time-based one-time password algorithm, as defined in RFC 6238 [12]), and event

« Previous 1 ... 15 16 17 18 19 20 21 22

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice