Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (540)
  • Article (199)
  • News (35)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 78 Next »

18%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
with the integrated system script: sudo apt-get install openjdk-8-jre wget http://pub.nxfilter.org/nxfilter-4.3.6.1.deb sudo dpkg -i nxfilter-4.3.6.1.deb sudo systemctl enable nxfilter sudo systemctl start nxfilter
18%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
18%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
SCO components on a single computer make sure you comply with the following hardware requirements: Minimum 1GB RAM, 2GB RAM recommended 200MB available hard disk space Dual-core processor
18%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
through the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework [3]. SQLmap supports any popular database system, such as My
18%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
. Some reference tables can be synchronized with multiple regions. With a replication factor (RF)=3 across three data centers or availability zones, the database can be used even if one of the data centers
18%
GNU Parallel: Multicore at the Command Line with GNU Parallel
04.11.2011
Home »  HPC  »  Articles  » 
Recent trends in computing are toward more cores doing more tasks at once. These days, you are likely to have a dual- or quad-core CPU in your laptop, and perhaps 4, 6, 12, or 16 cores in your
18%
Creating Active Directory reports using free tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © reddz, 123RF.com
: gplogview.exe -a a9034339-85ce-4ab6-9444-b14c33a93e89 \ -o \\dell\x\%computername%-GPEvents.txt You can also hide irrelevant data in the results files using the -n option: gplogview.exe -n -o \\dell
18%
Green IT
24.10.2011
Home »  Articles  » 
 
) and about 6 million Euros (large corporation). The total period of the study was divided into segments of three years each, because this reflects both the typical warranty period and the typical write
18%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
-in package managers. Table 1 Rsync vs. Rclone Feature Rsync Rclone License GPLv3 MIT Intended use Data backup between two computers or servers
18%
Open source monitoring with Zabbix
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Vincentiu Solomon on Unsplash
Zabbix monitoring stack with: $ helm repo add zabbix-community https://github.com/zabbix-community/helm-zabbix $ helm install -n zabbix --create-namespace zabbix --set zabbix_image_tag: alpine-6.4-latest

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice