Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (948)
  • Article (319)
  • News (103)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 138 Next »

18%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
-a9c7-1c7ef74a9ba4 Blocks the use of copied or imitated system tools (preview) No c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb Blocks web shell creation for servers
18%
Windows Server 2012 Administration
07.06.2012
Home »  Articles  » 
 
settings, manage IIS, manage storage, check events, add roles, add features, and much more. Figure 3: Server Manager’s default view, ready to manage your
18%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4
18%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
in practice, because Rancher comes with its own Kubernetes core distribution in tow in the form of K3s, which provides all the features you need. In this article, I guide you through the implementation
18%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
://www.mydomain.orgwinget source list Manage sources of packages (e.g., add custom source)List source repositories search find winget search OpenJDKwinget search --query "Python 3"winget search Adobe -s
18%
CronRAT Malware Targets Linux Servers
29.11.2021
Home »  News  » 
 
and not that the date of the task is legitimate. The crontab date specification for ConRAT is 52 23 31 2 3, which would generate a run time error upon execution. However, that runtime will never happen, because the date
18%
2014 Intel Parallel Universe Computing Challenge
11.11.2014
Home »  HPC  »  News  » 
 
to reach the final match the afternoon of November 20. This year’s contest again comprises a supercomputing trivia round followed by a parallel computing code challenge. Both components take place live
18%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
and Brotli Comparison 01 -rw-r--r-- 1 sw sw 124 8 Sep 16:52 hello-world.html 02 -rw-r--r-- 1 sw sw 77 8 Sep 16:53 hello-world.html.br 03 -rw-r--r-- 1 sw sw 113 8 Sep 16:53 hello
18%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
is achieved by using commonly installed tools that focus on the user, putting data and possibly information in the user’s hands (and probably the admin’s if an issue crops up). The data can also be used
18%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
or which packets can reach the VM. AWS offers its own, rather expensive VPN as a Service (VPNaaS). Therefore, the setup in this article uses its own VPN VM, which is cheaper – or to be more precise, might

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice