Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%C3%A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (396)
  • Article (137)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 58 Next »

16%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [3]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim
16%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
Hetzner Announces S3-Compatible Object Storage Hosting and cloud provider Hetzner has announced Object Storage – a high-performance solution for storing unstructured data – which is suitable ... In the news: Hetzner Announces S3-Compatible Object Storage; Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure; OpenMP 6.0 Released; Open Source Development Improves
16%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
_html folder, and there, create a symbolic link to packages. Finally, the file permissions are modified for security reasons (Listing 3). Listing 3 Publication $ sudo a2enmod userdir $ mkdir
16%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
paper [2] entitled "Processes as Files." Cross-pollinated through the later Bell Labs Plan 9 implementation, Linux's version is original in exposing not just process information, but a wealth of system
16%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
api.raml 01 #%Raml 0.8 02 title: Contacts 03 version: 0.1 04 #baseUri: http://www.rve.com/contactshelf 05 baseUri: https://mocksvc.mulesoft.com/mocks/d4c4356f-0508-4277-9060-00ab6dd36e9b
16%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
as PaaS GigaSpaces, the company behind Cloudify, began developing the tool in 2012. Cloudify was originally designed as a tool for Platform-as-a-Service (PaaS) applications (although the boundaries to Saa
16%
Managing Virtual Infrastructures
21.01.2013
Home »  Articles  » 
 
Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... based on Windows. Bye-Bye Windows Although the Red Hat developers ported all the components of the management component, RHEV-M, from C# to Java in RHEV 3.0, use of the Administrator Console for RHEV ... Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... Managing Virtual Infrastructures with oVirt 3.1
16%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
Leaving DiskPart... C:> The preparative work on the USB drive is complete. Gathering the Utilities Now you need to download the Windows Automated Installation Kit (AIK) for Windows 7, named KB3AIK
16%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
wants into that network. Few, if any, ever come in with guns a-blazing.   One easy way to gather a lot of information on your target network quickly is to perform a SYN scan with Nmap. Nmap may well
16%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
. Programming for XenServer A well-documented programming interface (API) gives administrators the ability to communicate with the host system at runtime and handle recurring tasks. Programming libraries for C

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice