Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (617)
  • Article (146)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 78 Next »

9%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
patch libctf-nobfd0 perl libctf0 perl-modules-5.32 liberror-perl runc libgdbm-compat4 tini libintl-perl Next, you need
9%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
     color: "Red", 11     Model year: 1988 12   } 13 }; Programmers can use variables directly; the appropriate var s are added by CoffeeScript when you compile. As in shell scripts, the hash sign (# ) starts
9%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
under the Mozilla Public License (MPL) v2.0 [7]. Visibility into the deployment state. It exposes its state to inspection (CloudFormation does not expose its state in any way, although it recently
9%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
9%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(text) { 11 polycrypt.importKey("raw", hex2bin(encRawKey)).oncomplete = function(e) { 12 var key = e.target.result; 13 polycrypt.encrypt(encAlg, key, str2bin(text)).oncomplete = function(e) { 14 var
9%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
Type yum 10 Arch noarch 11 Sync Schedule 10 0 * * * 12 Packages 10 13 Files 0 14 Distributions None 15 Publish True 16 Clones
9%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
years without making any further adjustments. Rules and regulations are not static and need to be reviewed every six or 12 months. Where vendors provide updates, you will want to check and integrate
9%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
-Agent: curl/7.51.0 08 > Accept: */* 09 > 10 < HTTP/1.1 200 OK 11 < Content-Type: application/json 12 < Content-Length: 382 13 < X-Content-Type-Options: nosniff 14 < Server: WEBrick/1.3.1 (Ruby/2
9%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
Shell command: > Get-Process | Select-Object -Property name, ID PowerSploit expects a list of bytes in the form 0xXX,0xXX,0xXX,0xXX. To generate the correct format, the Backtrack tools collection [2] is helpful
9%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
-server"})) 06 07 ; Enable all interfaces for TCP, UDP and websockets: 08 (let [host "0.0.0.0"] 09 (tcp-server {:host host}) 10 (udp-server {:host host}) 11 (ws-server {:host host})) 12 13 ; Clean up events

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice