Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (433)
  • Article (123)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 Next »

17%
Automate Active Directory management with the Python PyAD library
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Eric Issele, 123RF.com
in the following, but watch out: As part of the initial execution, Pip offers to update from version 22.3.1 to 23.1.2 (Figure 1). Do not agree to this request under any circumstances if you want to use PyAD, because
17%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
now have interfaces, including Nmap. Figure 3 shows a typical Nmap scan using the OSScan option (-0) that you've seen a thousand times. Notice with this particular scan that Nmap is having a hard time
17%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
. Modules and Prices The developers sell the device, which is made in China, from their online store [3]. The price for the basic device is $169 (EUR199). Purchasing a silicone case ($15, EUR18) is also
17%
Wireshark
27.11.2011
Home »  Articles  » 
 
An administrator can only gain useful insights from network analysis if they understand the underlying procedures and protocols. The new version of Wireshark, 1.6, formerly known as Ethereal, can ... for recording and to view JPG files directly in Wireshark. Version 1.6 of Wireshark (which prompted me to write this article) was released in July 2011 and offers better support for large files of more than 2GB
17%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
by one of the five regional Internet registries (RIRs). The American Registry for Internet Numbers (ARIN) [3] is responsible for the US, Canada, parts of the Caribbean, and Antarctica, whereas The RIPE
17%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
range of Hadoop services. Amazon offers Elastic MapReduce (EMR) [8], an implementation of Hadoop with support for Hadoop 2.2 and HBase 0.94.7, as well as the MapR M7, M5, and M3 Hadoop distributions
17%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
code is written and compiled in one of three classic HPC languages: Fortran [2], C++ [3], or C [4]. Why these languages? Because they have enabled generation of very efficient code for a long time
17%
Netcat – The Admin’s Best Friend
20.08.2012
Home »  Articles  » 
 
examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, entering # nc -s 1.2.3.4 examplehost.tld 8181 will connect to examplhost
17%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
seconds, for example: # nc -p 16000 -w 30 examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter: # nc -s 1.2.3
17%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice