Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (470)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 57 Next »

6%
John the Ripper
22.08.2011
Home »  Articles  » 
 
-based algorithm and a small word list: $ john -single passfile.txt Loaded 2 password hashes with 2 different salts (FreeBSD MD5 [32/64 X2]) guesses: 0 time: 0:00:00:01 100% c/s: 9433 trying: hken1900 Finally ... Easy to remember but difficult to guess isn’t just a catchy phrase for choosing passwords, it’s the law of the Net. Learn how to check your password using a tool network intruders use every day
6%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
-control-setup You will see Unbound generating keys. Now restart container and test whether nothing has broken: docker restart caa97f2fe1fe dig @192.168.0.110 time.hanscees.com To install the remote client, just
6%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
into a deceptive sense of security: Thanks to technologies such as self-monitoring analysis and reporting technology (S.M.A.R.T.) and wear leveling, these data storage devices can predict their demise and usually
6%
Security features in Windows Server 2022
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Matthew Henry on Unsplash
access (DMA) protection, SystemGuard, Secure Boot, virtualization-based security (VBS), and Trusted Platform Module (TPM) 2.0 security features. These technologies must be present and enabled on the server
6%
Installing applications in OpenStack with Murano
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © stylephotographs, 123RF.com
] command-line tool. Provided there is a connection to the Internet, of course, the necessary Glance images [8] also end up where they belong (Figure 2
6%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
be derived), the sAMAccountName, the UPN, and even the complex attribute OnPremisesExtensionAttributes, which contains ExtensionAttribute ranging from x =1 to 15 . On the other hand, you will see fewer
6%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
 –  – UTM 220  – FullGuard Bundle  – US$ 2,870 Endian 3.0 Endian released the new version of its firewall in January. The version jump from 2.5.2 to 3.0 already shows
6%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
://en.wikipedia.org/wiki/Principle_of_least_privilege Docker user guide: http://docs.oracle.com/cd/E52668_01/E75728/html/section_rdz_hmw_2q.html Jenkins: https://jenkins.io Privilege separation: https
6%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
/windows/forum/all/windows-performance-recorder-wont-start-recording/958c45c9-dd4f-4ba2-bbe2-b90ba0b01e56 Assessment Platform command-line options: https://learn.microsoft.com/en-us/windows-hardware/test/assessments/assessment-platform-command-line-syntax Windows ... Tools at Hand
6%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
when interacting with the AI, this is equivalent to transferring the data to the Internet and releasing the data to the AI, which then learns by processing the information. In a worst case scenario

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice