Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12 00s Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (228)
  • Article (79)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 Next »

6%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
) Figure 2 shows an attacker using Nmap to conduct a quick discovery with the command: system1$ sudo nmap -sV -O -A 172.16.190.159 -p 445 Figure 2: Attack
6%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
the Ubuntu Precise (12.04) Universe repository and as a package for Debian Sid. To install the server on Linux, you first need to install the necessary packages; the example here uses an Ubuntu distribution
6%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
for different scenarios on the website [9]. The Bitnami project pages supply users with installers for Linux, Windows, and OS X, as well as a virtual machine for VMware [10]. To set up the DAM system yourself
6%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
6%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
Cloud computing is, without a doubt, the IT topic of our time. No issue pushes infrastructure managers with large-scale enterprises as hard as how to best implement the cloud. The IaaS principle
6%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
will also use the secure or insecure variants of the SMTP, IMAP, and POP3 protocols. Email can also be encrypted and signed using PGP or S/MIME. Postmaster modules allow the admin to add an X-OTRS header ... 20
6%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
a redundant power supply or hard disks. Its Intel Xeon 4110 processor has eight CPU cores and 32GB of RAM. Its bigger siblings, the SNS 3655 and SNS 3695, come with 12 CPU cores on the Intel Xeon 4116 CPU
6%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
area network (SAN) controller might need to run its BIOS first so that the booting operating system can find a hard disk. As early as in the 1980s, an option was introduced to run the system boot over
6%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
designed for Live use on optical data carriers were first seen more than 20 years ago. In the meantime, USB flash memory has largely replaced the CDs and DVDs used in the past. They are not only smaller than
6%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
with TurnKey Linux TurnKey Linux version 13.0 has been available since August 2014. All TKL appliances have been based on Debian since version 12.0; whereas previous versions were based on Ubuntu

« Previous 1 ... 23 24 25 26 27 28 29 30 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice