Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (939)
  • Article (276)
  • News (124)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 135 Next »

16%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, use the winenum script and the scraper script. The winenum script will dump tokens and hashes, providing you with lots of information (see Figure 6). The scraper script will pull down the registry
16%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
Editor in either Microsoft Word 2003 or 2007 (see Figure 6). Figure 6: First portion of evi1_payload.vbs in Visual Basic Editor Then copy the portion
16%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
, as is their mountpoint (if applicable). A useful option is -f , which adds filesystem output to the lsblk output (Figure 6). Figure 6. Output from the “lsblk -f” command
16%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
will see a screen like that shown in Figure 6. Notice that a small window opens just above the process table listing CPU usage, memory usage, the user, and more about that process
16%
Zentyal Server 3.5
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © PozitivStudija, fotolia.com
allows you to update the system or just specific components. Finally, you can start the process by clicking Refresh (Figure 6). Figure 6: The system lists
16%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
/audispd name_format = NONE max_log_file = 6 max_log_file_action = ROTATE space_left = 75 space_left_action = SYSLOG action_mail_acct = root admin_space_left = 50 admin_space_left_action = SUSPEND disk
16%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
of BusyBox. Administrators can use it to check out what has happened or restart the installation. As of this writing, ONIE supports the Switch Light [6] operating systems by Big Switch Networks, Cumulus
16%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
the graphical interface or with text files in JSON format [6] stored in the /etc/cockpit/machines.d/ directory. A configuration file would resemble Listing 1: "address" can be either the IP address or the DNS
16%
A new approach to more attractive histograms in Prometheus
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Markus Winkler on Unsplash
_request_duration_seconds_bucket{le="+Inf"} 2 http_request_duration_seconds_sum 6 http_request_duration_seconds_count 2 Figure 1: The two-second request is assigned to the 2.5s and 5s ranges
16%
Professional protection for small and mid-size enterprises
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Guido Vrola, 123RF.com
, depending on the nature of the data (Figure 6); then, you can see a graphical overview and check the matching lists for more detail. Reports also help you to discover why the firewall performed a certain

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 135 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice