Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 99 Next »

15%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
what services were running and used one of the services (WinSSHD) to log in remotely and get a terminal session. If there are a limited number of services running on the Windows box, you will need
15%
EGroupware, Group Office, and Kopano compared
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © 36clicks, 123RF.com
into EGroupware, if required. Figure 1: With Collabora Online, EGroupware functions as a full-fledged office platform. The Apache Guacamole [6] remote access
15%
Security boundaries in Windows
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Jan Canty on Unsplash
offers various protection mechanisms against remote and local attackers. Microsoft first differentiates between different border areas, or security boundaries, and defines separate protection goals
15%
OpenCanary attack detection
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
a corporate network, they will pursue different goals, starting with persistent login options on the computer to which they already have access. Maybe they will install a reverse shell, a customized remote
15%
Moving Data Between Virtual Machines
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © alphaspirit, 123RF.com
of a capture VM on each server. With the aid of overlay functions, you can forward the data traffic that you log to a dedicated port. Alternatively, you can use a remote switch port analyzer (RSPAN
15%
Goodbye Google Cloud Print
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © bilderbox, fotolia.com
needs to be done remotely rather than in close proximity to the user, such as printing a contract from the road to a printer in the back office or printing in remote warehouses. Printing from the cloud
15%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
for the attacker. The malware is apparently able to enter the system at a lesser security level and begin reconnaissance, performing tests and sending information back to a remote command and control center
15%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
on the previously configured Atomic instance and verify that it is also available there now: # ostree remote add f22-custom http://192.168.122.1:36073 --no-gpg-verify # ostree remote list -u f22-custom http://192
15%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
: Adding a PostgreSQL FDW as a database extension. You don't have to install an FDW on the remote database server, but you must ensure that the local database is granted access to the database you want
15%
News for Admins
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Gernot Krautberger, Fotolia
Hackers Threaten to Wipe More Than 300 Million Apple Devices Remotely A group of hackers that call themselves the "Turkish Crime Family" claim that they have access to more than 300 million

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice