Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1084)
  • Article (89)
  • News (8)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 119 Next »

24%
Amazon Announces AWS Fargate
12.12.2019
Home »  News  » 
 
regions (with more to come soon): US East (N. Virginia), US East (Ohio), Europe (Ireland), and Asia Pacific (Tokyo). Original announcement: https://www.argus-press.com/news/national/article_a30c4ca6-fffc
24%
Fedora 32 Server (Install Only)
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
The DVD in this issue contains the standard image x86_64/iso/Fedora-Server-dvd-x86_64-32-1.6.iso. Resources [1] Fedora 32: https://getfedora.org/en/server/ [2] Download: https
24%
Fedora 18
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
DEFECTIVE DVD? Defective discs will be replaced. Please send an email to mailto:cs@admin-magazine.com. The DVD attached
24%
High-performance Python – compiled code and C interface
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Konrad Bak, 123RF.com
functions (ufuncs) [5] and C callbacks. The compiler is under continual development, with the addition of more capability, more performance, and more NumPy functions. A ufunc operates on an ndarray [6
24%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
terminology for MACsec: https://community.cisco.com/t5/networking-knowledge-base/macsec-history-amp-terminology/ta-p/4436094 MACsec configuration on Cisco Catalyst 9300: https://www.cisco.com
24%
News for Admins
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
 
in the announcement (https://blogs.windows.com/windowsexperience/2024/01/04/introducing-a-new-copilot-key-to-kick-off-the-year-of-ai-powered-windows-pcs/), "and when pressed, the new key will invoke the Copilot
24%
Shell access via a web browser
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Roman Pyshchyk, 123RF.com
.key > certificate.pem Infos PHP Shell: http://phpshell.sourceforge.net Shell In A Box: http://code.google.com/p/shellinabox/ CAcert: http://www.cacert.org @IE The Author
24%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
Computer A), which then runs: $ nc -l -p 444 | more To get this attack going, a pen tester could use Metasploit's Meterpreter shell to issue a command to listen for the reverse shell. Figure 5 shows how
24%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
, the URL [/example?p1=aaal] is sent, with a single GET parameter. By setting the parameter as an insertion point for security testing, you can replace the aaa value with a variety of payloads, including
24%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
, -w -p -k where are: r – read access w – write access x – execute access a – change in a file or directory attribute The syntax

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 119 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice