Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (430)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 229 Next »

13%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
Unauthorized access to credentials is a part of virtually any successful cyberattack. Attackers are particularly interested in techniques that provide access credentials that allow far
13%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
notable version upgrades over the last few months is Mutillidae II [1], now available to practice ethical hacking. Provided by the OWASP Foundation  [2], the Open Worldwide Application Security Project
13%
Verifying your configuration
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kritiya Sumpun, 123RF.com
development life cycle to maintain much-needed parity. I'll use the Footloose and Docker container tools to bring up container machines for a test setup. Everything was tested on my Ubuntu 18.04 LTS laptop
13%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
equipment, as detailed in Table 1. In the case of the sole proprietorship, they assumed a desktop PC and a laptop. Table 1 Equipment per Size Class   Large Corp. Mid
13%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget
13%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) Proprietary product (RealTime) or features bare-metal recovery with separate license Bandwidth controls/Throttling Yes Yes, two methods Yes For laptop backups with TSM Fast
13%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
for managing the cloud provider's services. The display language for the AWS Management Console can be changed in any area of the console. Twelve languages are currently supported. To change the console
13%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
overly reliant on the providers offering this access, and when they had connectivity outages, disaster struck at our end. Being as diligent as possible, we all carried SSH keys around on phones, memory
13%
Cedexis Offers New Internet Performance Reporting Tool
03.05.2012
Home »  News  » 
 
Cedexis has launched a new data visualization interface. According to the press release, Cedexis publishes daily country-by-country reports on the performance of IT providers (hosting companies
13%
Hortonworks Data Platform Now Available
14.06.2012
Home »  News  » 
 
According to the announcement, HDP, an open source platform powered by Apache Hadoop, provides a comprehensive infrastructure that provides the vital management, monitoring, metadata and data

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice