Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (419)
  • Article (125)
  • News (10)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 56 Next »

64%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
12 ECDHE-RSA-DES-CBC3-SHA 13 DHE-RSA-AES128-SHA 14 DHE-RSA-AES256-SHA 15 EDH-RSA-DES-CBC3-SHA 16 17 AES128-GCM-SHA256 18 AES256-GCM-SHA384 19 AES128-SHA 20 AES256-SHA 21 DES-CBC3-SHA Listings
64%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
2001:db8::201:203:409 prefixlen 64 scopeid 0x0 inet6 2001:db8::5555 prefixlen 64 scopeid 0x0 inet6 fe80::1:2ff:fe03:409 prefixlen 64 scopeid 0x20 ether 02
64%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
. Listing 3 Import Trojan Image $ docker load -i nginx-trojan.tar 53bbd7a916c6: Loading layer [==================================================>] 20.48kB/20.48kB The image nginx:latest already
64%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
, most likely, (3/2) x 15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s 20 instructs sshguard
64%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
support to its Windows Vista and Windows Server platforms in 2007. Linux in all its variants and Apple's Mac OS X followed suit; thus, the new protocol spread with each new installation. On all ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your environment
64%
Routing with Quagga
19.02.2013
Home »  Articles  » 
OSPF 01 ! 02 hostname linuxrouter 03 password 8 7kdoaul4.iSTg 04 enable password 8 ZDF339a.20a3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09  multicast
64%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
of working around design bugs after the requirements have been specified increases non-linearly as the project moves through design (5x), coding (10x), development testing (20x), acceptance testing (50x
64%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
is KeePassX [3]. If you install the tool on a Mac, you can use your database on the go with a MacBook by using synchronization with cloud storage, just as you would for access by iPhone and Android
64%
Use PowerShell to manage Exchange Online
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © reddogs, 123RF.com
], a newly developed platform-independent version of the scripting language. PowerShell Core is based on .NET Core. PowerShell Core 6.x can be installed on Windows computers with Windows 7 or higher
64%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
is the registry – the storage space for Docker images – which did not even have a mechanism for authentication. Later, the image format was changed and Registry 2.0 (a.k.a., "Docker Distribution") was released

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice