Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (48)
  • News (9)
  • Article (6)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

45%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
. The platform also comes with secure email communication that supports OAuth 2.0 for POP3 and IMAP email protocols to enable modern and secure authentication for the retrieval of email from services
45%
Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure
05.12.2024
Home »  News  » 
 
, such as Cisco Discovery Protocol (CDP) or Link Layer Discovery Protocol (LLDP). Disable Internet Protocol (IP) source routing. Disable Secure Shell (SSH) version 1. Ensure only SSH version 2.0 is used
45%
Operating system images with bootc
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © alfazetchronicles, 123RF.com
that the components are included in the image: # podman run --rm -it quay.io/centos-bootc/centos-bootc:stream9 rpm -q kernel systemd podman bootc kernel-5.14.0-467.el9.aarch64 systemd-252-37.el9.aarch64 podman-5.1.0
45%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
] and extract WiFi passwords with hashcat [12]. Given the small size of the housing – Flipper Zero is just 10 cm wide and 4 cm high – it is not surprising that the performance of the integrated antennas
45%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
45%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
installing the software locally and enter a proxy address of 127.0.0.1:8080 . You could also use a proxy auto-configuration (PAC) file to simplify the global network configuration; the required files
45%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
--serial 05:0e:50:04:eb:b0:35:ad:e9:d7:6d:c1:0b:36:d6:0e:33:f1--signature-algorithm1.2.840.10045.4.3.2--issuer-o Let's Encrypt--pubkey-algorithm rsa--pubkey-size 256 This check would give you a pretty good
45%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
will use that in a bit. Listing 1: Check Directory Content $ ls -lstar total 62310 31150 drwxrwxr-x  0 laytonjb laytonjb 31897275 Dec 31  1969 DATA1 31152 -rw-rw-r--  1 laytonjb laytonjb 31897275 Aug  2
45%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
it up. After the install, the graphical dashboard (Figure 6) automatically appears in your local web browser. You can call it up again later at any time by typing http://127.0.0.1:5572/ in the address
45%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
represents different aspects and functions within an industrial network. Levels 0, 1, and 2 relate to direct production control. Level 0 includes sensors and actuators that interact directly with the physical

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice