Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Next »

31%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
the received signal. As a rule, the packets are buffered, which allows the endpoint to put the received packets back in the correct order and thus restore the original data stream. Sequence errors
31%
John the Ripper
22.08.2011
Home »  Articles  » 
 
/shadow > passfile.txt The passfile contains username:encrypted password pairs that look like: root:$1$gb9R8hhhcES983e khess:$50anHnciUcp02u82 Once you have created the password hash file, you can direct John
31%
MobaXterm: Unix for Windows
23.07.2012
Home »  Articles  » 
 
. Walk-Through When you first start MobaXterm, an alarm might be activated by Windows Firewall. If you then type allow , you can define a suitable rule. Then, MobaXterm will show you a local terminal
31%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
 for brevity]            8   10.59 so-4-2-0.mpr3.pao1.us.above.net (64.125.28.142)            9   11.00 metro0.sv.svcolo.com (208.185.168.173)            10  9.93  scanme.nmap.org (64.13.134.52)            Nmap
31%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
requires new materials, new design rules, new processor architectures, and, finally, new ways of programming," said Thom. "What we get after all this work is a faster, much more powerful computation system
31%
Rolling back from Windows 11 to Windows 10
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by cdd20 on Unsplash
at the operating system level. To do this, open the Windows Settings. Microsoft has revised the look and layout of the menu items compared with Windows 10. As a general rule, downgrading from Windows 11 to Windows
31%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
. Functionality is based on resource, security, and data management. As experience over the past few years has shown, signature-based and rule-based security solutions are no longer sufficient to protect against
31%
Creating reports with JasperReports
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sergey Nivens, 123RF.com
CEO does not see them in a report that is formatted correctly according to corporate identity rules; embellished with logo, tables, and graphics; and updatable every week with fresh figures on demand
31%
Making Small Business Server 2011 fit for 2014
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © diego cervo, 123RF.com
to the rules set by the SBS developers and also detects and diagnoses hidden problems and sources of error. WSSBPA requires the Microsoft Baseline Configuration Analyzer 2.0 [8]. Additionally, the analyzer
31%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
to the desired compliance rules. The Insights service gives you an easy option for this purpose. On the Hybrid Cloud Console, navigate to Security | Compliance | SCAP Policies and look for the Red Hat Insights

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice