Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%C3%A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (416)
  • Article (138)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 60 Next »

16%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
), infrastructure-as-code (IaC) misconfigurations, and sensitive information and passwords. Installation Trivy can be installed on all popular Linux distributions and macOS. Alternatively, you can run Trivy
16%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
]. Distributions in the Microsoft Store Debian GNU/Linux Fedora Remix for WSL Kali Linux Ubuntu 22.04 LTS, 20.04, 20.04 ARM, 18.04, 18.04 ARM, 16.04 SUSE Linux Enterprise Server 15 SP3, 15 SP2
16%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
hardware support [7]. I am using Ubuntu 22.04 (Jammy) for this test in the original us-east-1 availability zone. $ aws ec2 run-instances --image-id ami-0ea1c7db66fee3098 --region us-east-1 --key federico
16%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
updates once only at branch offices also saves network bandwidth. Only Signed Apps Device Guard [3] is a new technology in Windows 10 that aims to prevent malicious software from running on the system
16%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [3]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim
16%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
Hetzner Announces S3-Compatible Object Storage Hosting and cloud provider Hetzner has announced Object Storage – a high-performance solution for storing unstructured data – which is suitable ... In the news: Hetzner Announces S3-Compatible Object Storage; Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure; OpenMP 6.0 Released; Open Source Development Improves
16%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
_html folder, and there, create a symbolic link to packages. Finally, the file permissions are modified for security reasons (Listing 3). Listing 3 Publication $ sudo a2enmod userdir $ mkdir
16%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
paper [2] entitled "Processes as Files." Cross-pollinated through the later Bell Labs Plan 9 implementation, Linux's version is original in exposing not just process information, but a wealth of system
16%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
of the applications (22 percent) of the firms surveyed are currently hosted in the cloud. Additionally, 28 percent of testing now occurs in a cloud environment, and the report forecasts this to increase to 39 percent
16%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
fingerprinting. The following command executes a simple port scan on a chosen system: nmap -v -A www.haribo.de An abridged version of the output from this command is shown in Listing 1. It shows the standard

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice