Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (301)
  • Article (57)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 Next »

28%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
/var/log/messages on some Linux flavors) receives logging information. On Debian I'm becoming more accustomed to looking inside /var/log/auth.log for all things relating to logins, but I don't like
28%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
, which is passed by the caller in CPU register rax on x86-64 machines [8]. Syscall arguments are passed in registers rdi , rsi , rdx , r10 , r8 , and r9 . The return value of the syscall is returned
28%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
atomically and consistently across all the involved nodes. Here's a simple example of a transaction that involves updating the prices of two books: BEGIN; UPDATE books SET price = price * 0.9 WHERE title
28%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
be vulnerable. In a PowerShell command prompt window (CMD), run the following command under the SkyArk folder: PS C:\SkyArk> Scan -AWShadowAdmins -AccessKeyID AKIA5DWQIQ2MR6OXXXXX -SecretKey BYptvF+QF2kk8W4
28%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Lookup Output START RequestId: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Version: $LATEST ('www.devsecops.cc', [], [' 138.68.149.181' ]) END RequestId: 4e90b424-95d9-4453-a2f4-8f5259f5f263 REPORT Request
28%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
"href": "http://www.linux-magazine.com/NEWS/Gartner-worldwide-server_sales_drop" 08 } 09 ], 10 "title": "Gartner: Worldwide server sales drop", 11 "content": "
28%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
picture of what threats you need to address. To set up periodic scanning, go to the web interface by clicking on Environment  | Vulnerabilities  | Scan Job  | New Scan Job (Figure  8). Enter a job name
28%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
.docker.com/install/linux/docker-ce/ubuntu/#install-docker-engine---community-1 Twistlock AuthZ Broker: https://github.com/twistlock/authz Twistlock Jenkins plugin: https://www.twistlock.com/2018/05/09
28%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
JDK versions 7 and 8. On our lab machine, the test team used OpenJDK 1.8 from the Extra Packages for Enterprise Linux (EPEL) repository. For the Riemann client and dashboard, you also need to install the ruby
28%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
.168.2.2" }, { "name": "domain-search", "data": "mydomain.example.com, example.com" }], "subnet4": [{ "subnet": "192.168.2.0/24", "pools": [{"pool":"192.168.2.1 - 192.168.2.50"}], "option-data": [{ "name

« Previous 1 ... 29 30 31 32 33 34 35 36 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice