Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (354)
  • Article (115)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 Next »

10%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
PORT     STATE SERVICE    VERSION 21/tcp   open  ftp? 22/tcp   open  tcpwrapped 80/tcp   open  http       Apache httpd |_ html-title: Requested resource was http://www2.haribo
10%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
be no question of disabling the legacy algorithm for the time being. However, disabling MD5 signatures is something that you can (and should) do today. You can enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2
10%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
minutes (lines 22-24), which you can find in the web GUI under the system node. Dots in the name create folders in the hierarchy; to create a graph, you then just click on one of the values in the web app
10%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
-dkms:i386 - Native ZFS filesystem kernel modules for Linux 20 v zfs-dkms-build-depends - 21 c zfs-fuse - ZFS als FUSE 22 p zfs-fuse:i386
10%
News for Admins
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
percent of applications show flaws at the first scan, this number drops to approximately 22 percent shortly after, before rising to 30 percent again at four years. The number of applications with new flaws
10%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
19 ******************************************/ 20 module "gke" { 21 source = "terraform-google-modules/kubernetes-engine/google" 22 project_id = var.project_id 23
10%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
sub 4096R/F6685248 2013-04-17 18 $ sudo apt-get update 19 [...] 20 $ sudo apt-get install tkmon 21 [...] 22 The following NEW packages will be installed: 23 tkmon 24 [...] Conclusions
9%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
9%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
a progress indicator like this [ 30% ] Applying progress: 43:22 mins remaining. during the transfer process. When the image is fully transferred to the USB drive, you need to enter one final command
9%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
't speak until spoken to.)   The port scanner sends out a SYN request on a particular port number (22). The target responds with an ACK. The scanner notes the ACK and sends a RST to disconnect from

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice