Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 154 Next »

11%
It’s Official: No Headphone Jacks in New iPhones.
14.09.2016
Home »  News  » 
 
Lightning port. That could be challenging to a lot of enterprise users who need to plug their phones into power outlets while making long phone calls. Third-party vendors like Belkin are coming out
11%
DeepLocker: An AI Powered Malware
14.08.2018
Home »  News  » 
 
talking about it. IBM Researchers have created a tool called DeepLocker that explores the potential of machine learning in writing malware. “DeepLocker has changed the game of malware evasion by taking
11%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
Saryerwinnie's original result, the slowdown is measured in whole seconds, spanning four orders of magnitude from the ideal performance level, which appears to indicate that the rename system call [4
11%
Logging with systemd
18.02.2014
Home »  Articles  » 
system messages are reserved for root or members of the adm group. For an overview of all log messages, even from rotated logs, you simply call journalctl . The output and format are almost identical
11%
TCP Fast Open
05.03.2013
Home »  Articles  » 
 
. The technique, which is called TCP Fast Open (TFO), depends on streamlining the process of opening a TCP session. The idea itself is not new – way back in 1994, RFC1379 and RFC1644 specified the conceptually
11%
Pentest your web server with Nikto
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mike Wilson on Unsplash
them: Accessing the website from the same IP address will no longer be possible if this happens to you. Make sure you replace the domain in the call with ./nikto.pl -url .de -ssl Being locked out
11%
Save sudo logs on a remote computer
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by the blowup on Unsplash
contain an init script, so you have to start the service manually by calling sudo_logsrvd. The process moves directly into the background to avoid blocking the shell. If you would rather it run
11%
To syslog or not to syslog
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Zsolt Biczo, 123RF.com
for root or members of the adm group. For an overview of all log messages, even from rotated logs, you simply call journalctl. The output and format are almost identical to a /var/log/messages file
11%
Logical Bombs for Fun and Benchmarking
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
time base. Fork Bomb The fork [5] command, perhaps more than any other system call, is distinctive of Unix system design. The call enters kernel space in one process, but returns in two
11%
Encrypting DNS traffic on Linux with DoT
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Alexander Grey on Unsplash
calling dig. In the example here, I used the public DNS server (1.1.1.1) operated by provider Cloudflare [4]. In addition to regular DNS on port 53, it also supports the DoH and DoT protocols. For example

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice