Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (79)
  • Article (32)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next »

21%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
seven-year-old idea [14] as TCP Stealth. In 1997, Craig H. Rowland described how information can be transmitted camouflaged as the standard TCP header. Listing 1 shows the TCP header. Most of its parts
21%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
to logfiles, and it’s pretty simple to use: [laytonjb@test1 ~]$ logger "This is a test" ... [root@test1 ~]# tail -n 2 /var/log/messages Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet. Aug 22 17:00
20%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
used a VMware Workstation as the basis of my setup. To understand the process, though, you need a workstation with at least eight cores, 16GB of RAM, and 100GB of hard disk storage space. The host
20%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
:FORWARD ACCEPT [0:0] 05 :OUTPUT ACCEPT [125:13440] 06 -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT 07 -A INPUT -p icmp -j ACCEPT 08 -A INPUT -i lo -j ACCEPT 09 -A INPUT -p tcp -m state --state
20%
Web Cryptography API
26.11.2013
Home »  Articles  » 
RawKey = "4ea1...b2bf"; 02 var encAlg = { 03 name : "AES-GCM", 04 params : { 05 iv : hex2bin("534aea17"), 06 additionalData: hex2bin("534aea17"), 07 tagLength: 128 08 } 09 }; 10 function encrypt
20%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
($ssh, '/sbin/ifconfig'); 07 stream_set_blocking($stream, true); 08 09 $response = ''; 10 while($buffer = fread($stream, 4096)) { 11 $response .= $buffer; 12 } 13 14 fclose($stream); 15 echo $response; 16 17
20%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
Determining fastest mirrors epel/metalink | 12 kB 00:00 * elrepo: mirror.symnds.com
20%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
 Recheck: 978 11    ->  Bitmap Index Scan on mail_msg_idx  (cost=0.00..128.03 rows=4 width=0) 12    (actual time=34.925..34.925 rows=1650 loops=1) 13          Index Cond: (msg ~ '(updatable|views)'::text) 14
20%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
-> Bitmap Index Scan on mail_msg_idx (cost=0.00..128.03 rows=4 width=0) 12 (actual time=34.925..34.925 rows=1650 loops=1) 13 Index Cond: (msg ~ '(updatable|views)'::text) 14 Total runtime: 175
20%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
-comes-after-email/422625/ "John Chambers last keynote as CEO of CISCO," Cisco Live 2015, San Diego, CA, https://www.youtube.com/watch?v=ujBLqLFNr0s (timeline 28:00) Cisco-Kansas City agreement: https://newsroom.cisco.com

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice