Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (583)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 71 Next »

6%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
2.0 specification, which has been used for all systems ever since. PXE has evolved in the meantime. Strictly speaking, two different network boot processes are in use: PXE for PCs with BIOS and PXE
6%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
the docker ps command and then the docker inspect command, altering the hash to that for the Mutillidae container. In my case, that means I'll be pointing ZAP at http://172.17.0.2 for Mutillidae (that
6%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
-related domain names (Figure 1) is: $ ./fierce.pl -dns  -search searchoption1,searchoption2 (Where searchoption1 and searchoption2 are different names that the target goes by, such as acme.com ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
6%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
) Figure 2 shows an attacker using Nmap to conduct a quick discovery with the command: system1$ sudo nmap -sV -O -A 172.16.190.159 -p 445 Figure 2: Attack
6%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
table. The last five columns are predicted with the help of the first five columns and separate models in each case. The reader preferences in columns 2 through 6 and one of the five sub0 to sub4
6%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
of those on call. Granted, the rest of the Internet couldn't gain access, but the difference between a handful of authorized IP addresses and thousands is huge. Second, this approach added to administration
6%
What to Know Before Moving into HPC
08.04.2025
Home »  Articles  » 
After learning Linux , it’s time to learn some HPC - specific concepts and commands. ... ) and in your cluster. The -w compute-[01-04]  portion of the command is the option to specify the systems on which you want to run the specific command or script. In this case, rather than list each system ... After learning Linux , it’s time to learn some HPC - specific concepts and commands.
6%
DNS name resolution with HTTPS
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by saeed karimi on Unsplash
the question of trusting or mistrusting your own Internet provider; associations that provide protection against censorship [1] or offer data protection [2]; or large DNS providers such as Cloudflare [3], Google
6%
VMware connections to the Kubernetes market
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © jager, 123RF.com
be designed on the basis of the product. Enterprise PKS On the other hand, if you're used to no-worry packages, you'll feel more comfortable with the Enterprise PKS version (Figure 2) of the VMware Kubernetes
6%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
. The situation with Podman is different. Every container is instantiated directly by a user login session. The source information is kept in the container process data and auditd can map the user ID to specific

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice