Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1148)
  • Article (287)
  • News (73)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 152 Next »

16%
System 76 Unleashes World's Smallest Quad-GPU Workstation
20.10.2020
Home »  News  » 
.2 gen 2 Type-A ports, 1 USB 3.2 Type-C, 2 RJ-45 LAN ports, 5 audio jacks, built-in Intel® Wireless-AC (a/b/g/n/ac/ax), and Bluetooth 5.0 To accommodate such power, System 76 had to put serious work
16%
Black Lotus Labs Confirms Serious Flaw in Windows Subsystem for Linux
20.09.2021
Home »  News  » 
 
compiled with Python 3.9, using PyInstaller for the Debian OS, version 8.3.0-6. All of the samples, save one, contained private IP addresses. However, one sample was associated with a publicly routable IP
16%
Kali Linux 2025.3 Released with New Hacking Tools
30.09.2025
Home »  News  » 
 
Kali Linux 2025.3 adds 10 new hacking tools, several updates to Kali NetHunter, and beefs up support for Raspberry Pi devices. One of the more important additions to Kali Linux 2025.3 is the return ... Kali Linux 2025.3 Released with New Hacking Tools
16%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
. With DoH – in contrast to DNS over TLS (DoT; specified in RFC 7858) [3], with DNS packets themselves encrypted by TLS – even the DNS query as such can no longer be immediately identified if the DNS service
16%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
.000000, 1.000000) (n_pre, n_post) = (1, 1) dim             = 3 solver ID       = 0 ============================================= Struct Interface: ============================================= Struct
16%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
. For example, to run a report every three seconds for five iterations on eth0, you would use the command in Listing 4. Listing 4 capstats /opt/bro/bin/capstats -I 3 -n 5 -i eth0 1415510235
16%
NetworkManager at the command line
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © godrick, 123RF.com
-name virtbridge-port2 ifname virbr0-nic master virt-br0 06 Connection 'virtbridge-port2' (f598a4ce-6564-4b3f-b46e-c3da256915af) successfully added. 07 # brctl show virt-br0 bridge name bridge id STP enabled
16%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
/24 endpoint2=192.168.2.0/24 action=requireinrequireout auth1=computerpsk auth1psk="test123" qmsecmethods=esp:sha1-3des qmpfs=dhgroup2 If you need to create a large number
16%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
endpoint1=192.168.80.0/24 07 endpoint2=192.168.2.0/24 08 action=requireinrequireout 09 auth1=computerpsk 10 auth1psk="test123" 11 qmsecmethods=esp:sha1-3des 12 qmpfs=dhgroup2 If you need
16%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i kubeletctl pods --cidr 3.71.72.0/24 -i Figure 1: Scanning for nodes to see if they are vulnerable with an exposed kubelet

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 152 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice