Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%25390 Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (407)
  • Article (131)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 Next »

60%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
. Listing 1 A SIP Request 01 INVITE sip:bob@tuwien.ac.at SIP/2.0 02 Via: SIP/2.0/UDP myhost.myprovider.de;branch=z9hG4bK776asdhds 03 ... 04 To: Bob 05 ... 06 From: Alice
60%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
is an interpreted language that is "powerful, fast, lightweight" [2]. It is probably most well known as the scripting language used by the popular game World of Warcraft (WoW) [3]; however, Lua is also used
60%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX,10 Fierce [2], written
60%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
Press [1], Drupal [2], or Joomla [3], generally they only have to unpack the core on the server and then add other modules. Installing security updates conscientiously and in good time counteracts ubiquitous
60%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
, specialized meta-frameworks are available on GitHub, PowerLine [3] being just one example. PS2EXE [4] also follows a similar approach, although with completely different administrative goals. Another option
60%
Routing with Quagga
19.02.2013
Home »  Articles  » 
interface (as localhost), because the plaintext connection is easy to sniff, including the access passwords. Quagga with OSPF: A Simple Example Listings 1, 2, and 3 depict the Quagga, OSPF, and BGP
60%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
[9] is a USB flash drive with a free hardware layout that can generate one-time passwords. OpenKubus provides libraries for C, Perl, and PHP, as well as a server and a PAM module. LinOTP [10
60%
Wireshark
27.11.2011
Home »  Articles  » 
 
in Libpcap syntax: ether host 00:25:4b:bd:24:94 Figure 2: Wireshark includes a number of predefined display filters and supports interactive creation
60%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7 # # ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs /00
60%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
through steps 2 and 3 multiple times until the results work out. Document your own interpretation. As a result, you then ideally have an application profile that consists of a registered standard profile

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice