Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (318)
  • Article (70)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 39 Next »

57%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
assigns a unique ID to the user. It is advisable to assign values 1000 or below to administrative accounts; for example: admin:g6j0pelqmhg2n72zx947lf72rxf4iqzzml9zzrcnfzgreguqx69nopme6ctq8r8s:1000:192.168.0.0
57%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
: Katacoda has a learning scenario in which you can enter commands. Source: katacoda.com [8]. In the left pane, the note under Task explains that you need to restart the CRI-O runtime to fix a bug
57%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
is then given a new shell from jamesvb1 , which DNS identifies as s1.stangernet.com . Figure 8: The attacking system. Figures 9 and 10 show another sequence
57%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
M Ocean SDK: https://github.com/dwavesystems/dwave-ocean-sdk Leap: https://www.dwavesys.com/press-releases/d-wave-launches-leap-first-real-time-quantum-application-environment Oak Ridge
57%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
of this article, note that I'm not a security or cryptography expert, nor do I play one on TV. Please do your own research. That said, in the sections below, I review a few file encryption/decryption tools
57%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
Shell 2.0, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
56%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
8.04 system maintained by the Metasploit project. Information Gathering Once the intruder logs in with a low-end user account, the first step is to get some information about the system and rights
56%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
1 $39.99 $39.99 ZION XON-720P mATX/ITX slim desktop case 300W power supply 1 $34.99 $34.99 250GB SATA 3.0Gbps disk — 1 $59
56%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
Network Coordination Centre (NCC) [4] is responsible for the European arena. In addition to ASNs, RIRs register the IP address spaces (prefixes) of their members. Well-known examples are the prefixes 8.8.8.0
56%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
the country code as the source instead of an IP address. For example, a block for Somalia implemented by iptables is: iptables -A INPUT -m state --state NEW -m geoip --source-country SO -j DROP Depending

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice