Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (274)
  • Article (8)
  • News (5)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 29 Next »

10%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
sends the ST back to the client. 5. The client sends the ST to the target server and authenticates it. 6. The target server authenticates the client
10%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
/64 BS]... DONE 07 Many salts: 45898 c/s real, 45898 c/s virtual 08 Only one salt: 45108 c/s real, 45186 c/s virtual 09 10 Benchmarking: FreeBSD MD5 [32/64 X2]... DONE 11 Raw: 10995 c/s real, 10995
10%
Monitoring server hardware with the Nagios IPMI plugin
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Vladimir Nenov, 123RF.com
to analog (threshold) sensors in a reliable way. FreeIPMI is now included by an growing number of Linux distributions, such as RHEL/Cent OS as of version 5.2, Ubuntu as of version 10.04, and Debian Squeeze [2
10%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
the target host once. In order to ping continuously, as on Linux, you will need to specify the -s option. Listing 2 Ping on Solaris # uname -sr SunOS 5.10 # ping server server is alive # ping -s
10%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
AS required a JDK, because it provided a compiler for Java code. The compiler is needed to compile JSP files. Current versions – that is, AS5 or AS6 – can make do with a JRE, because the JBoss distribution
10%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
-On The current v1.5 of Proxmox VE from May 2010 [1] is based on the Debian 5.0 (Lenny) 64-bit version. The Proxmox VE kernel is a standard 64-bit kernel with Debian patches, OpenVZ patches for Debian, and KVM
10%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
-Client, Samba-Winbind [2], and the Kerberos package, which is typically called krb5 , or something similar, by most distributions. Once you have all of these components in place, you can launch
10%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
Metasploit tips for achieving privilege escalation. For instance, wouldn't it be great to have a shell on another computer just in case you lose your meterpreter shell? Integrating Nessus 5 with Metasploit
10%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
National Laboratory occupies the No. 4 spot, and at No. 5 is JUQUEEN, a BlueGene/Q system at the Forschungszentrum Juelich in Germany. According to the list, JUQUEEN is now the most powerful system in Europe
10%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
Business Analytics 4.5 Pentaho Corporation has released Pentaho Business Analytics 4.5. With this release, Pentaho provides new user-driven, interactive visualization and data exploration capabilities

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice