Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (484)
  • Article (145)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 65 Next »

16%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
the Proxy Listeners Section (Figure 1) to identify the IP Address and port the proxy is listening on. The default port is 127.0.0.1:8080. Figure 1: Options
16%
Storage cluster management with LINSTOR
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © sdecoret, 123RF.com
romulus 192.168.133.11 node create --node-type satellite remus 192.168.133.12 node create --node-type satellite vulcan 192.168.133.13 node create --node-type satellite kronos 192.168.133.14 In addition
16%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
Definition), against which all requests get validated as soon as they are received by one of the processing servers. Listing 2 Request XML 0" encoding="UTF-8"?>
16%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
/11/2012 03:17 PM Favorites 04/16/2012 12:00 PM 60,304 g2mdlhlpx.exe 07/11/2012 03:17 PM Links 07/11/2012 03:17 PM Music 07/29/2012 03:56 PM
16%
A smoke-jumping admin's best friend
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Thomas Detert, Fotolia.com
. It is written in Python and has bindings for other languages. It also can be coupled with curses-based plotting if desired. A YouTube video explains some uses for psutil [12]. Non
16%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
[11], Foswiki [12], and XWiki [13]. The last three tools in this list are primarily oriented toward business requirements and come with uncluttered interfaces, an integrated WYSIWYG editor by default
16%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
-enterprise-3.8.1-ubuntu-14.04-amd64/packages/ubuntu-14.04-amd64 sudo dpkg -i pe-cloud-provisioner-libs_0.3.2-1puppet1_amd64.deb sudo dpkg -i pe-cloud-provisioner_1.2.0-1puppet1_all.deb vSphere Setup After
16%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
No a8f5898e-1dc8-49a9-9878-85004b8a61e6 Blocks Win32 API calls from Office macros No 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b Deploys advanced protection against ransomware
16%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
in the Metasploit Framework itself. Start the Metasploit msfconsole console and load nessus : msf > load nessus Once the plugins are loaded, connect to the server. msf > nessus_connect cr0wn:password@localhost ok
16%
Next-generation terminal UI tools
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Lucy Baldwin, 123RF.com
(Figure 3). It presents a history ribbon view of the CPU, breaks out individual cores, and includes load average [12] figures. Network interfaces benefit from a similar visualization (Figure 4

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 65 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice