Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (881)
  • Article (211)
  • News (92)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 119 Next »

10%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
lists locally logged in users only; -x leaves out the login times. The PsLoggedOn tool is useful when you need to investigate unauthorized access to your network and see the computers on which a user
10%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
/iptables -X -t nat 12 /sbin/iptables -X -t mangle 13 /sbin/iptables --flush FORWARD 14 /sbin/iptables --flush INPUT 15 /sbin/iptables --flush OUTPUT 16 17 #exit 18 19 #policies for the chains
10%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
the docbook-to-man tool. The program documentation contains timestamps, for example, as do HTML pages made by Doxygen [7] or PDF documents built with LaTeX [8]. Problems are also caused by different lists
10%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
, specifying the relationships between projects, their build configurations (e.g., Debug or Release ), and target platforms (e.g., Any CPU or x64 ). The file also stores global solution settings, including
10%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
you would navigate to the appropriate directory (e.g., windows/x64/meterpreter/reverse_tcp). Once there, you can set the IP addresses and ports (Figure 6) and simply listen for a connection back from
10%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
_facts.instance is defined 11 12 - name: Destroy faulted VM 13 vmware_guest: 14 hostname: "{{ Vv_hostname }}" 15 username: "{{ Vv_username }}" 16 password: "{{ Vv_password }}" 17 name: "{{ vm_name }}" 18
10%
Updating Small Business Server 2008
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Petra Wanzki, Fotolia
for Windows Server 2008. Start by downloading the installation file for the service pack [1] and make sure you have the x64 variant. After you double-click the .exe file, SBS 2008 will show you a message from
10%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
and runs in a Java virtual machine, Riemann has a web interface (the Riemann Dash) and various clients for Linux, OS X, and Windows. The Riemann service stores all the information in its index and uses
10%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
2001:db8::201:203:409 prefixlen 64 scopeid 0x0 inet6 2001:db8::5555 prefixlen 64 scopeid 0x0 inet6 fe80::1:2ff:fe03:409 prefixlen 64 scopeid 0x20 ether 02
10%
Use PowerShell to manage Exchange Online
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © reddogs, 123RF.com
a separate installation package on GitHub. On macOS machines, you need at least macOS 10.12. Additionally, PowerShell Core 6.x can also run in Docker containers and on the Kali Linux security distribution

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 119 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice