Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (454)
  • Article (147)
  • News (41)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 Next »

17%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
desktop connection or mstsc.exe /v:127.0.0.1:3390 at the Windows command line, you can then start the Kali Linux desktop. After completing your work, log off from the desktop and quit the RDP server
17%
Prowling AWS
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Dmitry Naumov, 123RF.com
1 Checks and Group Names Description No./Type of Checks Group Name Identity and access management 22 checks group 1 Logging 9 checks
17%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
": [ 15 { 16 "port": 1 17 } 18 ] 19 }, 20 { 21 "addresses": [ 22 { 23 "ip": "192,168,121,102" 24
17%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385:481173385(0
17%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
manipulate it? One simple approach to spoofing can be found in the base.c file in the sources of older kernel versions: res = access_process_vm(task, mm->arg_start, buffer, len, 0); For each entry
17%
Securing containers with Anchore
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © loiic, Fotolia.com
something like: /usr/lib/python2.7/dist-packages/ requests/__init__.py:80: RequestsDependencyWarning: urllib3 (1.24.1) or chardet (3.0.4) doesn't match a supported version! Requests
17%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
('Guards! Guards!', {'de':'Wachen! Wachen!', 'fr' : 'Au Guet!'} ); 20 21 create edge Relation from #11:0 to #11:1 set type='Married', from='1993-01-01'; 22 23 create edge Appear from #11:0 to #13:0 set
17%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
/joe/.ssh/google_compute_engine -A -p 22 joe@1.2.3.4 -- 11 Warning: Permanently added '1.2.3.4' (ECDSA) to the list of known hosts. 12 Enter passphrase for key '/home/joe/.ssh/google_compute_engine': 13 Linux gcerocks-instance-1 3.2.0
17%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
similarity value of 1.0 to the two rascals. Of course, this is not yet hard evidence of unfair practices, but the result at least shows where you could drill down further to reveal more evidence
17%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
# DHCP Server Configuration file. # see /usr/share/doc/dhcp*/dhcpd.conf.example # see dhcpd.conf(5) man page # subnet 10.14.2.0 netmask 255.255.255.0 { option routers 10

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice