Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (537)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 71 Next »

24%
Protecting Samba file servers in heterogeneous environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by rawpixel on Unsplash
[::]:* LISTEN As you can see, only port 22 for SSH is open for incoming connections for both IPv4 and IPv6. If you are not (yet) using IPv6 on your network, you should disable it, because what good
24%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
uses the syntax tcpdump -n -I -s where -n means tcpdump should not resolve IP addresses to domain names or port numbers to service names, -I is the interface to use
24%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power outage
24%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
is over and done with as soon as the message is delivered. MQTT enables a decoupled 1-to-n or 1-to-1 relationship between different devices or programs that do not specifically need to know each other
24%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
will work if the netcat listener is running as root (Figure 6). Figure 6: Adding user david with UID 0. Next, I need to give the user a password
24%
Caching with CacheFS
07.07.2020
Home »  HPC  »  Articles  » 
: idx=138 dat=0 spc=0 Objects: alc=0 nal=0 avl=0 ded=0 ChkAux : non=0 ok=0 upd=0 obs=0 Pages  : mrk=0 unc=0 Acquire: n=138 nul=0 noc=0 ok=138 nbf=0 oom=0 Lookups: n=0 neg=0 pos=0 crt=0 tmo=0 Invals : n=0 run
24%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
or write network traffic information to a file. A basic capture uses the syntax tcpdump -n -i -s where -n means tcpdump should not resolve IP addresses to domain names or port
24%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
/share/zoneinfo -type f | \ 07 grep -v 'posix|right|Etc|SystemV | \ 08 grep -i $city` 09 echo -n "Time in $1: "; TZ=`echo $z` date The first section of this code ensures that the script's argument
24%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
connections to join remote LANs through a private tunnel over the Internet. The first RFCs on IPsec were drafted during the development of IPv6 and date back to 1995. The current version is described by RFC
24%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
and maintained only by Red Hat. In more recent versions (e.g., 2.0 in RHEL 5 and Fedora Core 6 or later), the legacy CMAN implementation was replaced by an open implementation based on the Application Interface

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice