Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (78)
  • News (11)
  • Article (6)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

27%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
will use that in a bit. Listing 1: Check Directory Content $ ls -lstar total 62310 31150 drwxrwxr-x  0 laytonjb laytonjb 31897275 Dec 31  1969 DATA1 31152 -rw-rw-r--  1 laytonjb laytonjb 31897275 Aug  2
27%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
represents different aspects and functions within an industrial network. Levels 0, 1, and 2 relate to direct production control. Level 0 includes sensors and actuators that interact directly with the physical
27%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
ADRecon Prerequisites .NET Framework 3.0 or newer (included in Windows 7 and later) PowerShell 2.0 or newer (included in Windows 7 and later) AzureAD PowerShell Module 3.0 or newer – installable
27%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
): { echo -ne "HTTP/1.0 200 OK\r\n\r\n"; \ cat filename.tar.gz; } | nc -l -p 15000 Be warned that this might not work for you, but with some trial and error, to enable some extra interaction, you could try
27%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
to the root user. If you want to check all files, you can set scan_ignore_root="0" in the conf.maldet configuration file to check the entire database. When maldet needs to scan large areas of the filesystem
27%
Reading and understanding database execution plans
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Gunnar Pippel, 123RF.com
----------------------------------------------------------------- 15 | 0 | SELECT STATEMENT | 3130K | 833 | 16 |* 1 | HASH JOIN | 3130K | 833 | 17 |* 2 | TABLE ACCESS BY INDEX ROWID | SALES | 566K
27%
Web-based network monitoring
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © arasdubov, 123RF.com
browser on http://127.0.0.1:9000 and log in as admin with the default password bloonix . The service's web interface first opens a dashboard on which you can view the active services and check out
27%
The best performance yet
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lucy Baldwin, 123RF.com
in combination with a card supporting the extended standard (SDXC). CQ mode was introduced in 2017 with version 6.0 of the SD specification [4], but although the Linux kernel had been supporting CQ mode for e
27%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
 (/etc/warewulf/warewulf.conf ). You then add a section to the configuration file: api:   enabled: true   allowed subnets:     - 127.0.0.1/8     - ::1/128     - 192.168.64.1/32 (Note: This code is from the webinar.) By default
27%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
into Excel. Figure 1: Starting the Microsoft Security Compliance Manager. SCM Hands On SCM requires .NET Framework 4.0 [2]. The free SQL Server 2008 R2

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice