Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12!600 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (364)
  • Article (120)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 50 Next »

17%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
msstore Search repo(s) for matching packages by nameLimit search to a particular package source list ls winget listwinget list - n 12winget list --upgrade-availablewinget list
17%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
time relative to Docker. Docker Dominance The first version of Docker [1] was released March 20, 2013. Although containers had already been available on Unix-like systems for a few years, Docker
17%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
17%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77 22} 13 $s_anchor_tag = "
17%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
machine. Initial evaluations on the practical conditions are easily possible on a well-equipped PC with a quad-core CPU, 1GB of RAM, a network interface card, and 20GB of free hard disk storage
17%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
.16.190.159). In the last line, I execute the command to attack system2: ./eternalblue exploit7.py 172.16.190.159 ./shellcode/sc x From the security analyst (blue team) worker's perspective, Figure 7 shows what the result
17%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
of 2019 as an extension to the then new Gaia-X initiative. After a successfully completed evaluation contract from the German Federal Agency for Disruptive Innovation (SPRIND), the idea was financed
17%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
 ---------------------------------------------------------------------------------------------------- 20  Seq Scan on mail (cost=0.00..5628.25 rows=4 width=961) (actual 21  time=2.401..1519.809 rows=672 loops=1) 22    Filter: (msg ~ '(updatable|views)'::text) 23    Rows Removed by Filter: 40148 24
17%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
---------------------------------------------------------------------------------------------------- 20 Seq Scan on mail (cost=0.00..5628.25 rows=4 width=961) (actual 21 time=2.401..1519.809 rows=672 loops=1) 22 Filter: (msg ~ '(updatable|views)'::text) 23 Rows Removed by Filter: 40148 24
17%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
server in Azure, Amazon Elastic Compute Cloud (AWS EC2), or Google Compute, you have to pay attention to the correct firewall settings when creating the VM. In addition to SSH port 22, you need to allow

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice