Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (343)
  • Article (116)
  • News (108)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 57 Next »

18%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
, the number of exploits contained in Metasploit has exploded to more than 2,000. Additionally, countless new targets have been added, including software from Adobe and Oracle and new databases. The framework
18%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
_file | ACTIVE | +--------------+---------------+ 1 row in set (0.00 sec) Finally, confirm data encryption at rest with the strings command to view the encrypted output: $ strings /var
18%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
Windows workstations for a particular company department, you would create a template for one of those workstations. If you’re responsible for implementing 100,000 IoT devices, you could use this domain
18%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
parameters, and it can provide potential attackers a vector for an attack or monitoring. To increase the security, access was restricted to just 30 parameters – compared with the 3,000 parameters that sysctl
18%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
be manipulated retrospectively, which would make technologies such as blockchain superfluous, at least in part. Around 1,000 voxels per level are bundled into a square field that, with all of its levels
18%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
130,000 university staff and students and operates the Munich Scientific Network with around 110,000 devices. To manage the mass of passwords for servers and services operated at the LRZ
18%
Listing 5
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
-web           noarch     3.5.1-1            /ganglia-web-3.5.1-1.noarch     5.2 M Installing for dependencies:  php                   x86_64     5.3.3-14.el6_3     sl-security                     1.1 M  php
18%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
replied to say it would slightly decrease. What areas are finding the highest rate of open source adoptions? According to the survey respondents, those areas are: Security – with 52 percent
18%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
48 49 - name: Create VPC Peering 50 ec2_vpc_peer: 51 region: "{{ region }}" 52 vpc_id: "{{ myvpcint.vpc.id }}" 53 peer_vpc_id: "{{ myvpcext.vpc.id }}" 54 state: present 55 register
18%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
Thorsten Scherf 52 - initial version Running rpmbuild -ba custom-selinux-policy finally gives you the source and binary RPMs. You need the appropriate development tools in place

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice