Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (323)
  • Article (91)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 Next »

18%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
as of yet [6]-[8]. The only path that remains, then, is to accept that a part of the memory changes while copying. With older Linux versions, this was quite simple, because dd could copy /dev/mem locally
18%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
Name ------- ------ ----- ----- ----- ------ -- ----------- 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 74 9 1464 2568 42 0.09 2172 armsvc 195 10 2380 2984 62
18%
High availability for RESTful services with OpenStack
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Ying Feng Johansson, 123RF.com
02 log 127.0.0.1 local0 03 maxconn 4000 04 daemon 05 uid 99 06 gid 99 07 08 defaults 09 log global 10 mode http 11 option httplog 12 option dontlognull 13 timeout server 5s
18%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
an imminent failure. The lm_sensors tool [5] lets you monitor the fan and temperature. With just a little scripting, you can even create a heat map of the cluster to identify hotspots.  The smartmontools [6
18%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
in 2014. At the time of writing, the available Kea versions were 2.2.0 (July 2022, Current-Stable) and 2.3.6 (March 2023, Experimental-Development). Most distributions have prebuilt Kea packages
18%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
(e.g., which you can use to read passwords in the scope of a pentest) are available for download from GitHub [5] [6]. Flipper Zero is designed for interaction with a smartphone. During the initial
18%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
daily 05 missingok 06 notifempty 07 compress 08 delaycompress 09 sharedscripts 10 postrotate 11 invoke-rc.d rsyslog reload > /dev/null 12 endscript 13 } Finally, to see the syslog
18%
Exploring PowerDNS
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © ladyann, 123RF.com
and records DNSSEC support (as of 3.x) Web-based management options DNS data stored in plain text (BIND compatible) IPv4 and IPv6, UDP/TCP, 100% compliant [3] MySQL, Postgre
18%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
. Figure 12: Kate 3.3.4 on CentOS 6.8 with KDE. Leafpad No one says that a GUI editor has to have lots of features. It can be very lightweight and simple, which is exactly the focus of Leafpad
18%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
variant will do; it does not have to come from the official Microsoft Store  [6]. Alternatively, the attacker can create their own Linux derivative for WSL with known threats and tools. The command PS

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice