Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: server 10s files%2server. started inaccessible 04 windows 7 00s 04 for%2px ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (824)
  • Article (227)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 106 Next »

17%
Guacamole: Remote Desktop
04.02.2013
Home »  Articles  » 
 
the desktop on a Windows 7 PC using the RDP protocol. This will work just as well with a real Windows terminal server or a computer on which the desktop is shared via a VNC server. Next, you need to introduce
17%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
tested the Windows client program up to Windows 7. The backup server must run Unix or Linux. Amanda refers to the backup server as the "Backup Server Host." The systems you are backing up are "Backup
17%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
certificates." Listing 2 generate_certs_for_active_users.py 01 #!/usr/bin/python 02 import urllib, json, os, subprocess, sys 03 04 url = "http://vpnapi.charite.de/vpn/user/status/activevpn" 05
17%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
GuardDuty on AWS through Infrastructure as Code with HashiCorp's venerable Terraform [2] and look at the type of alerts it stands guard and looks out for. Minus a third-party application ingesting
17%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
instructions for the global SSL configuration. The configuration information resides in different files on different distributions. In the original source code for Apache 2.4.x, the file is $SERVER ... SSL and TLS are very complex technologies. If you want to avoid wading through cryptography manuals to harden your HTTPS web server, read on for practical recommendations on establishing, securing
16%
Unleashing Accelerated Speeds with RAM Drives
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Vladimir Nenov, 123RF.com
2011 - 2021 Petros Koutoupis ** Attached device rd1 of size 32 Mbytes $ sudo rapiddisk -l rapiddisk 7.2.0 Copyright 2011 - 2021 Petros Koutoupis List of RapidDisk device(s): RapidDisk Device 1: rd1
16%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
’ll start by trying the Windows meterpreter reverse_tcp payload , see Figure 1. Figure 1: msfpayload -l grep windows The windows ... How to Hide a Malicious File
16%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
of file deletions – resolving this problem in most configurations not involving RAID, which is still negatively affected. The /etc/fstab file shows that this partition is installed with Ubuntu 12.04's
16%
Let the editor wars begin!
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Kirill Makarov, 123RF.com
highlighting with the help of extension files. I started using gedit on Windows with version 2.30 (Figure 8) and with about the same version on CentOS 6.x
16%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
Encrypting your data is becoming increasingly important, but you don’t always have to use an encrypted filesystem. Sometimes just encrypting files is enough. ... are documented in the .zip file format specification. Also, starting in version 6.2 of the ZIP format, file name encryption was introduced so that metadata was encrypted in what is called the “Central Directory ... Encrypting your data is becoming increasingly important, but you don’t always have to use an encrypted filesystem. Sometimes just encrypting files is enough. ... Safe Files ... Encrypting Files

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice