Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (639)
  • Article (140)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 80 Next »

9%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD
9%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
as shown in the following listing. Apache/2.2.16 (Debian) DAV/2 SVN/1.6.12 mod_fcgid/2.3.6 Phusion_Passenger/3.0.11 mod_ssl/2.2.16 OpenSSL/0.9.8o Server at www.domain.tld Port 80 Treacherous Error Messages
9%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
shown in Figure 4. Figure 4: Header bytes 12-15. Looking at byte 13, if SYN and ACK are set, then your binary value would be 00010010 , which
9%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, use the winenum script and the scraper script. The winenum script will dump tokens and hashes, providing you with lots of information (see Figure 6). The scraper script will pull down the registry
9%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
will see a screen like that shown in Figure 6. Notice that a small window opens just above the process table listing CPU usage, memory usage, the user, and more about that process
9%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
the graphical interface or with text files in JSON format [6] stored in the /etc/cockpit/machines.d/ directory. A configuration file would resemble Listing 1: "address" can be either the IP address or the DNS
9%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
: 6 08 microcode : 0x60c 09 cpu MHz : 800.000 10 cache size : 6144 KB 11 physical id : 0 12 siblings : 2 13 core id : 0 14 cpu cores : 2 15 apicid
9%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
January 2012 through March 2012. According to the report, 6 million new malware samples were created in the first quarter of 2012. The announcement states that "Trojans set a new record as the preferred
9%
Open source remote access to Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Nikolay Okhitin, Fotolia
is launched, select Actions | Create New Domain . There, you will be asked to enter the 12-digit domain identifier, and the public key will be sent to the WiKID server. You will be prompted to enter
9%
Use PowerShell to manage Exchange Online
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © reddogs, 123RF.com
a separate installation package on GitHub. On macOS machines, you need at least macOS 10.12. Additionally, PowerShell Core 6.x can also run in Docker containers and on the Kali Linux security distribution

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice