Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%25390 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (494)
  • Article (172)
  • News (35)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 71 Next »

16%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [3]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim
16%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
_html folder, and there, create a symbolic link to packages. Finally, the file permissions are modified for security reasons (Listing 3). Listing 3 Publication $ sudo a2enmod userdir $ mkdir
16%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
experimenting with the keyboard-integrated computer format so popular back in the age of Commodore's Amiga and C64 machines, launching the Pi 400 [3] and its recent upgrade, the Pi 500 [4], soon after the launch
16%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
of the applications (22 percent) of the firms surveyed are currently hosted in the cloud. Additionally, 28 percent of testing now occurs in a cloud environment, and the report forecasts this to increase to 39 percent
16%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
fingerprinting. The following command executes a simple port scan on a chosen system: nmap -v -A www.haribo.de An abridged version of the output from this command is shown in Listing 1. It shows the standard
16%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
as PaaS GigaSpaces, the company behind Cloudify, began developing the tool in 2012. Cloudify was originally designed as a tool for Platform-as-a-Service (PaaS) applications (although the boundaries to Saa
16%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
\ Host\: %c\n\ Date\: $(date)\n\ " | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & Each time a running service port is probed, you can do far more than just logging
16%
Managing Virtual Infrastructures
21.01.2013
Home »  Articles  » 
 
Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... based on Windows. Bye-Bye Windows Although the Red Hat developers ported all the components of the management component, RHEV-M, from C# to Java in RHEV 3.0, use of the Administrator Console for RHEV ... Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... Managing Virtual Infrastructures with oVirt 3.1
16%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
Leaving DiskPart... C:> The preparative work on the USB drive is complete. Gathering the Utilities Now you need to download the Windows Automated Installation Kit (AIK) for Windows 7, named KB3AIK
16%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
wants into that network. Few, if any, ever come in with guns a-blazing.   One easy way to gather a lot of information on your target network quickly is to perform a SYN scan with Nmap. Nmap may well

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice