Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (416)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 59 Next »

25%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
of the stack in the Application Layer (OSI model Layer 7) [6]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application
25%
Modern implementation of DHCP with Kea
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Cheryl Ann Quigley, Fotolia.com
to existing management systems and databases. Some outdated solutions also lack functions for IPv6. The Kea project, launched in 2014, modernizes the DHCP server. Kea was designed as a successor
25%
Protecting Samba file servers in heterogeneous environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by rawpixel on Unsplash
[::]:* LISTEN As you can see, only port 22 for SSH is open for incoming connections for both IPv4 and IPv6. If you are not (yet) using IPv6 on your network, you should disable it, because what good
25%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
call up the application (line 6). You need to specify a profile to save the tool's configuration. As soon as the software has launched, you will find the password in the logs (line 9); it is generated
25%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power outage
25%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
is over and done with as soon as the message is delivered. MQTT enables a decoupled 1-to-n or 1-to-1 relationship between different devices or programs that do not specifically need to know each other
25%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
will work if the netcat listener is running as root (Figure 6). Figure 6: Adding user david with UID 0. Next, I need to give the user a password
25%
Caching with CacheFS
07.07.2020
Home »  HPC  »  Articles  » 
: idx=138 dat=0 spc=0 Objects: alc=0 nal=0 avl=0 ded=0 ChkAux : non=0 ok=0 upd=0 obs=0 Pages  : mrk=0 unc=0 Acquire: n=138 nul=0 noc=0 ok=138 nbf=0 oom=0 Lookups: n=0 neg=0 pos=0 crt=0 tmo=0 Invals : n=0 run
25%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
or write network traffic information to a file. A basic capture uses the syntax tcpdump -n -i -s where -n means tcpdump should not resolve IP addresses to domain names or port
25%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
connections to join remote LANs through a private tunnel over the Internet. The first RFCs on IPsec were drafted during the development of IPv6 and date back to 1995. The current version is described by RFC

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice