Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (696)
  • Article (207)
  • News (39)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 95 Next »

17%
News for Admins
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Gernot Krautberger, Fotolia
, "could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server." You can read more about all of the vulnerabilities that were
17%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
SQLmap about this cookie for the attack to succeed, and you can discover this, for example, using the Firefox “Tamper Data” plugin. The complete line now looks like this: sqlmap.py -u "http://127.0.0
17%
Server distributions for small businesses tested
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © wabeno, 123RF.com
. The Koozali Foundation [3], from the US, has been responsible for the software, which was released under the GPL, since 2013. Weighing in at just 640MB for the 64-bit version and just under 600MB for the 32-bit
17%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
will be followed this time, although test builds are now available online [2]. Jigsawing One core feature of Java 9 par excellence is the Java Platform Module System that became known as Project Jigsaw [3]. Thus
17%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
command: $ cat /var/lib/mysql/testDB/testTB.ibd | head -n 20 The command output will generate plaintext information containing raw data stored in the corresponding database table. Key Management
17%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
your server against attacks. Figure 3: How to ignore certain ports whilst using the Advanced modes. To Ignore or Not to Ignore The next parameters
17%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
for x86_64 PCs (910MB) and ARM64 systems (935MB). The hybrid image can be launched either from a CD, DVD, or USB stick. The x86_64 system works with both BIOS and UEFI firmware, whereas the ARMv8 variant
17%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
 –  – UTM 220  – FullGuard Bundle  – US$ 2,870 Endian 3.0 Endian released the new version of its firewall in January. The version jump from 2.5.2 to 3.0 already shows
17%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
of this type could look like. Listing 3 Generating Certificates $ ssh-keygen -s ca_root_key -h -n server.example.com,172.16.155.130 -I server.example.com -V +180d server.example.com $ ssh
17%
Create flexible backups with Kopia
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Marcus Woodbridge on Unsplash
that processes files sector by sector [3]). Figure 1: Kopia architecture (source: Kopia [2]). Layers Manage Storage The lowest hierarchical element

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice