Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (134)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 14 Next »

8%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
names as targets. Thus, you could launch a connection scan of ports 0 through 1023 in the lemon.com domain by entering nmap -sT -p 0-1023 www.lemon.com . To scan a whole network, enter the netmask ... 0
8%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
, information from the community, and trial and error. In any case, you will want to deactivate the print spooler services on your Tier 0 systems permanently (Figure 2). If you set up shared printers in your AD
8%
Setting up Exchange Server 2010 with SP1
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Francois Lariviere, 123RF.com
the installation, the Exchange management console will appear. Troubleshooting In some situations, the server installation will fail. In this case, you can press Retry to attempt to install the corresponding
8%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
and classification 0 cannot be optimized and appear in red. The panel shows points with values 1 and 2 in green, indicating that the cases can be optimized. If a point has value 3 and contains a function that cannot
8%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
.1.53, with some added bug fixes, additional storage engines, new features, and performance improvements. Versions of MariaDB that do not have an equivalently numbered version of MySQL (e.g., MariaDB 5.2.4) contain
8%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
use only non-destructive methods, however, you might be surprised how far they get. In many cases, they can access what are considered to be secure rooms within just a couple of minutes. Many
8%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
://lxr.free-electrons.com/source/mm/oom_kill.c?v=2.6.32 mm/oom_kill.c: http://lxr.free-electrons.com/source/mm/oom_kill.c?v=3.2 The Author Federico Lucifredi is the maintainer of man(1
8%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
version 2.6.23. To check your system, you can enter the command: uname -r. You'll be on the safe side as of openSUSE 11.0 and Ubuntu 8.04. Additionally, your kernel needs to enable support for dynamic
8%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
-on-LAN [2]. Additionally, you can add multiple connections to a cluster. In this case, all of the connected machines will run any commands you type in parallel. Starter's Gun Because this jack
8%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
this, we will look at an example that may be fictive but is nonetheless not too far from today's practical SaaS applications. Case Study Corporations can outsource the email service to a SaaS provider

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice