Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 70 Next »

6%
Chatbots put to the scripting test
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © lexandersikovl, 123RF.com
pc; do if [ "$pn" = "Last" ] || [ "$pn" = "Available" ]; then continue fi pv2=$(rpm -q --qf '%{VERSION}\n' $pn ) IFS='-' read -ra pv3 < "$pv" printf "%-40s %-20s %-20s
6%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
.microsoft.com/en-us/troubleshoot/windows-server/virtualization/antivirus-exclusions-for-hyper-v-hosts Generation 2 security settings for VMs: https://github.com/MicrosoftDocs/windowsserverdocs/blob/master
6%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
, or for the default. For Apache, the files live in /etc/apache2/sites-enabled/. Listing 1 Apache Gateway Config ProxyRequests Off AllowEncodedSlashes On ProxyPass "/sliders/" "http://127.0.0
6%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
no restrictions. To create inexpensive, small systems in Azure, setting the filters to 0-2GB RAM and 1-2 CPUs would get you to the B1s or B1ls (Linux only) series. The B1ls series is fine for up to 100 systems
6%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
vertical dots next to the ID. For clients up to v1.1.9, select the ID/Relay Server option from the context menu. As of v1.2.0, you will find the required options in the Network area of the Settings tab
6%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
a host named myhost.server.com in the My_Company SNMP community, the command would be: ./lnms device:add --v2c -c My_Company myhost.server.com LibreNMS also supports ping-only devices, when only
6%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
2.0 specification, which has been used for all systems ever since. PXE has evolved in the meantime. Strictly speaking, two different network boot processes are in use: PXE for PCs with BIOS and PXE
6%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
the docker ps command and then the docker inspect command, altering the hash to that for the Mutillidae container. In my case, that means I'll be pointing ZAP at http://172.17.0.2 for Mutillidae (that
6%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
-related domain names (Figure 1) is: $ ./fierce.pl -dns  -search searchoption1,searchoption2 (Where searchoption1 and searchoption2 are different names that the target goes by, such as acme.com ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
6%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
) Figure 2 shows an attacker using Nmap to conduct a quick discovery with the command: system1$ sudo nmap -sV -O -A 172.16.190.159 -p 445 Figure 2: Attack

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice