Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (492)
  • Article (146)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 66 Next »

11%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
patch libctf-nobfd0 perl libctf0 perl-modules-5.32 liberror-perl runc libgdbm-compat4 tini libintl-perl Next, you need
11%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
     color: "Red", 11     Model year: 1988 12   } 13 }; Programmers can use variables directly; the appropriate var s are added by CoffeeScript when you compile. As in shell scripts, the hash sign (# ) starts
11%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
under the Mozilla Public License (MPL) v2.0 [7]. Visibility into the deployment state. It exposes its state to inspection (CloudFormation does not expose its state in any way, although it recently
11%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
11%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(text) { 11 polycrypt.importKey("raw", hex2bin(encRawKey)).oncomplete = function(e) { 12 var key = e.target.result; 13 polycrypt.encrypt(encAlg, key, str2bin(text)).oncomplete = function(e) { 14 var
11%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
years without making any further adjustments. Rules and regulations are not static and need to be reviewed every six or 12 months. Where vendors provide updates, you will want to check and integrate
11%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
-Agent: curl/7.51.0 08 > Accept: */* 09 > 10 < HTTP/1.1 200 OK 11 < Content-Type: application/json 12 < Content-Length: 382 13 < X-Content-Type-Options: nosniff 14 < Server: WEBrick/1.3.1 (Ruby/2
11%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
-server"})) 06 07 ; Enable all interfaces for TCP, UDP and websockets: 08 (let [host "0.0.0.0"] 09 (tcp-server {:host host}) 10 (udp-server {:host host}) 11 (ws-server {:host host})) 12 13 ; Clean up events
11%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
.168.21.21" ipv4_subnet_mask: "255.255.255.0" ipv4_gateway: "192.168.21.254" ipv4_nameserver: - "8.8.8.8" - "8.8.4.4" properties: cpu_arch: "x86_64" ram: "65536" disk_size: "1024" cpus
11%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
AliveInterval and ClientAliveCountMax, are intended to help meet the compliance requirements: grep -i clientalive /etc/ssh/sshd_config ClientAliveInterval 600 ClientAliveCountMax 0 Once you have made these changes to your

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice