Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 71 Next »

10%
Malware analysis in the sandbox
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Rostislav Zatonskiy, 123RF.com
dynamically without first setting up a Cuckoo environment, then online services, such as malwr.com, hosted by the Shadowserver Foundation [3], are recommended. Upload the file in question, and shortly afterward
10%
Tested: Barracuda firewall X201
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
itself and can handle UMTS, HSDPA, and HSUPA up to 7.2Mbps. Administrators can also control the firewall by text message in an emergency (e.g., to reboot). The 3G modem costs about US$ 200. Because
10%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
up a server netcat to listen on port 5555 and set up a client netcat to talk to SSH on port 22. Getting the client and server to pass the data they receive to each other forms a proxy (Figure 7), so I
10%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release 3.23, which allows admins to set up replica instances (slaves) that receive all data
10%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
the output. For example: nmap -sV --script exploit -d3 targethost NSE scripts have a clear-cut structure. This becomes most clear when you take a look at an existing script. The scripts not only define
10%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
$ TOKEN=$(kubectl describe secret $(kubectl get secrets | grep default | cut -f1 -d ' ') | grep -E '^token' | cut -f2 -d':' | tr -d '\t'); echo $TOKEN   bTpzZXJ2aWNlYWNjb3VudDpkZWZhdWx0OmRlZmF1b
10%
Multiprocessing in Python with Fortran and OpenMP
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Photo by Zachary Young on Unsplash
the two languages that calls Fortran 77/90/95 code, Fortran 90/95 modules, and C functions from Python. F2PY accesses Fortran module data from Python, allowing Python functions to be called from Fortran
10%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
block provides some basic information. The service is named in the title line, and it is later seen in bold as a heading in the documentation (e.g., Swagger Petstore (Simple) in Figure 3). The API
10%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
correctly, you can simply try the sshfs -V command as a user (no root needed): $ sshfs -V SSHFS version 2.5 FUSE library version: 2.8.3 fusermount version: 2.8.3 using FUSE kernel interface version 7
10%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
of the compromised system is determined by the data stored on it and its potential use for malicious purposes. Post-exploitation focuses on the information from the hacked system, which is available for further use

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice