Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (870)
  • Article (89)
  • News (8)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 98 Next »

37%
Monitoring containers
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © kangshutters, 123RF.com
Advisor. Instead, other tools step in. One of the tools that generates graphics from the statistics in InfluxDB is Grafana [5], a fork of Kibana [6] used in the ELK (Elasticsearch, Logstash, Kibana) stack. Grafana
37%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
variant will do; it does not have to come from the official Microsoft Store  [6]. Alternatively, the attacker can create their own Linux derivative for WSL with known threats and tools. The command PS
37%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
[6] to fire up the clever Stethoscope. On my Linux Mint (Tara) laptop, which sits atop Ubuntu Linux 18.04, I already have Docker CE installed (instructions for installing Docker CE are online [7]). I
37%
Managing Port Scan Results with Dr. Portscan
30.09.2013
Home »  Articles  » 
 
nmap as a cronjob once a day on a Linux machine to scan all the ports in a network range equivalent to a legacy Class B network: /usr/bin/nmap -v -v -oG - -p 1-65535 10.1.0.0/16 > /tmp
37%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
and the other on all IPv6 IP addresses. Listing 1 Checking Open Ports chris@DebianBox:~# lsof -i :22 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sshd 3328 root 3r IPv4 33323 0t0 TCP *:ssh
37%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
5) and for iptables (Listing 6). Your mileage may vary. Listing 6 Iptables Start and Stop Commands start_command = /sbin/iptables -I INPUT -s %IP% -p tcp --dport 22 -j ACCEPT stop
37%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
server version. Infos Windows Server 2022 ADMX and GPO settings: https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/windows-server-2022-admx-and-gp-settings-now-available/m-p
37%
Project management with Phabricator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Joy Fera, fotolia.com
. However, Phabricator is not yet compatible with this version of PHP, so you have to install PHP 5 from another source: sudo add-apt-repository ppa:ondrej/php sudo apt-get update sudo apt-get install php5.6
37%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
cache (line 4). Last but not least, run apt to install the community edition of Docker on your system (line 5). A call to systemctl (line 6) should then show active as the docker.service status
37%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
, the malicious code is executed. A YARA rule that detects this process can be found in a GitHub repository [6] (Listing 1). The YARA rule can identify and classify malware. Listing 1 YARA Rule Rule

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice