Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1169)
  • Article (264)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 148 Next »

20%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
the executable, will open a meterpreter shell on the victim’s Windows box (see Figure 3). Figure 3: msfcli multi/handler options (above) and executing the listener
20%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
to reduce the zoom, use the m key to "minimize" (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts with the plus (+ ) key. Likewise, you can
20%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
=4444 E This command will open a listener on the local machine over port 4444. Once the victim runs the executable, it will open a meterpreter shell on the victim's Windows box (Figure 3
20%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
20%
Stat-like Tools for Admins
19.11.2014
Home »  HPC  »  Articles  » 
. The output is fairly similar to that of vmstat and dstat (Table 3). Table 3: Mpstat Output Column Output CPU Processor number to which the output refers. In Figure 6, it refers
20%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
.126.22.9 Ready 3h v1.6.2 Listing 2 Kubernetes Node Data Structure in YAML $ kubectl get node 10.126.22.9 -o yaml apiVersion: v1 kind: Node metadata: creation
20%
Web-based reconnaissance
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Wayne Daniels, 123RF.com
belong to the company of interest. As an example in this article, I scan the website for the U.S. Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) [3]. To begin, I load the workspace (Listing 2
20%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
the Download button, a ZIP file starts downloading. In the following command, you can see the version I'm using as I decompress the file: $ unzip vault_1.3.2_linux_amd64.zip The next thing to do is move
20%
Making Small Business Server 2011 fit for 2014
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © diego cervo, 123RF.com
] Exchange Server 2010 Service Pack 3 [2] Update Rollup 4 for Exchange Server 2010 Service Pack 3 [3] SharePoint Foundation 2010 SP2  [4], Redo Backup for the system backup [5]. Data Backup
20%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
policies can be assigned to the same security principal both directly and through policy silos (Figure 3). Policies from the silo always take precedence over the directly assigned policies

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice