Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 101 Next »

15%
Building a port scanner in Python
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Leo Blanchette, 123RF.com
, if unexpected ports appear in the results (e.g., port 3306, for MySQL databases, or port 3389, for the Remote Desktop Protocol), you might need to investigate further. Open database ports could, for example
15%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
could specify an SSH command that retrieves data from a remote machine. The commercial SarCheck tool goes one step further. Although it has been around since 1994, the Linux version is still
15%
Chive
17.04.2012
Home »  Articles  » 
 
or Ubuntu system with Apache2 and a VHost configuration, this will be /var/www/vhosts/virtual_host/httpdocs . If you are installing Chive via SSH on a remote server, the following command line will take care
15%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
examples thus focus on this virtualization solution. If the virtual machine is running on a remote machine, you need to integrate the IP address or domain name into the URI. The command virsh -c qemu
15%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
. Notice the available rcmd modules (rcmd is the “remote command” used by pdsh ) at the bottom of Listing 1 states that only ssh and exec are available. If rsh wasn't excluded, it would be listed here
15%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
on a remote server and the resulting text file is about 8,000 lines long, several columns wide, and you don't have an easy way to retrieve it from the remote server. Copying and pasting just won't cut it
15%
News for Admins
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
 
-1075/ in Microsoft Windows that allows "remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows." The vulnerability exists in all supported Windows versions, including Windows 10
15%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
Virtual private networks (VPNs) connect remote offices over the Internet. However, when the number of offices increases, so does the number of VPN tunnels. Scaling becomes important when connecting
15%
News for Admins
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
 
and bypass Secure Boot protections. Of course, in order to take advantage of this flaw, an attacker would have to have access to the physical system or remote access to the grub.cfg configuration file
15%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
, such as remote branch offices, retail POS, cell towers, and autonomous automobiles. For more information, read the official announcement from Canonical (https://ubuntu.com/blog/introducing-ha-microk8s-the-ultra-reliable-minimal-kubernetes).

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice