Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (79)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

89%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
posixaccount /etc/dirsrv/schema/10rfc2307.ldif objectClasses: ( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Standard LDAP objectclass' SUP top AUXILIARY MUST ( cn $ uid $ uidNumber $ gidNumber $ home ... 2010
89%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
-conf --add-device USB-device-name (Figure 6). The command pamusb-conf --add-user user Figure 6: The USB device is identified by its properties. If the user ... 2010
89%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
to tell fdisk the desired "disk geometry" first because this information cannot be gathered from a block device when you are just working with a file copy. 6. losetup and cryptoloop Working with copies ... 2010
89%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
for an alternative to Nessus, the Metasploit Framework [6] is an open source, but far more complicated, security scanner – see the "Metasploit" box.) Metasploit The Metasploit Framework, which was programmed ... 2010
89%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
of the client request (both for POST and for GET), as well as the most important server environment details [6]. Additionally, you can use regular expressions. For example, to investigate an HTTP request to find ... 2010
89%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
, and to provide protection against VoIP spam by various means. Additionally, other initiatives are SpITAssassin [6], an extension of SpamAssassin functionality, and the SPIT defense solution (SPIT AL). SPIT AL ... 2010
89%
Bundle your custom apps in a Debian package
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Cathy Yeulet, 123RF.com
should fail nicely, so if you start 10 instances when your app gets 6 million tweets, you at least want them to deliver a nice page before they're ready to do business. To begin, Create a directory ... 2010
89%
Service management by the book
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Michael Flippo, Fotolia.com
, RequestTracker (RT) [6] is definitely on the low end, although it does have a better "look and feel" than OTRS and some other tools (Figure 3). I would categorize it as low to mid-range, because it provides ... 2010
89%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
Labs [6]. This variant is of most interest to corporations who already have accounts with these providers and use their spam and virus filters. If you're not a customer of one of these services but do ... 2010
89%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
saved in /home/khess/.ssh/id_rsa.pub. 09 the key fingerprint is: 10 6d:2c:04:dd:bf:b2:de:e1:fc:52:e9:7f:59:10:98:bb khess@windows 11 The key's randomart image is: 12 +--[ RSA 2048]----+ 13 | .. . o ... 2010

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice