Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (946)
  • Article (262)
  • News (43)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 126 Next »

20%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
, determined an expected value (mean) 1.6ms greater than requested with a standard deviation (sigma) of 0.3ms [7], and reported the range between the minimum and maximum values encountered – handling
20%
A Bash-based monitoring tool
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © citalliance, 123RF.com
), the main branch hasn't been updated for 16 months. Although not necessarily a bad thing, it is something to be noticed. Another top-like tool is atop [3]. Like top, the first part of the output is a summary
20%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [3]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim
20%
Password management with FreeIPA
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Marqs, photocase.com
GZZbW1tdzhKCml0RTVlcDhFa1U1VWhaemxsNW Q3eWFYU2VEa25pRVVE WUpMMkpHNDNJWmRFVVFuM1hWUWt4Q0xIN0xzVUI3V0oKUC94TFY4a1FHQXB QY1MzcUVyME44MTJ6Q1NPR1U1RDNvNTNoRFhhVG95Y1cwRW1UUldmNHQzNkFrcFhreGszbwo2eW0we
20%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
and production. To show how monitoring profiles can be implemented for a specific server, the example distinguishes between mail, web, and database servers. It assumes that the stable version 1.12.3 of OpenNMS [6
20%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, 28 ports open for incoming connections, and 441 packages installed and not updated for a while. Listing 2: grep, ps and netstat example results user@metasploitable:~$ uname -a Linux metasploitable 2.6
20%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stockbksts, 123RF.com
Windows version 3.0.3; version 3.0.6 is now available. Forensic duplication again was performed in read-only mode as an additional (virtual) disk. For case management, you can enter a name, the storage
20%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
-time password (OTP), is transmitted in plain text in addition to the user password. RFC 6113 [3] defines the flexible authentication secure tunneling (FAST) pre-authentication method for this approach
20%
The weak spot of SBCs
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Lucy Baldwin, 123RF.com
at the command line if using some care. Figure 3: The gnome-disks read benchmark on a SanDisk A1 U1 card. Entering dd [6] to a valid path on the filesystem
20%
Setting up DevOps Orchestration Platform
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © J¸rgen Acker, Photocase.com
.9.5) [5] Ansible 2.8.1 Python 3.6.9 Python 2.7.17 Terraform v0.12.0 Golang: go1.10.4 linux/amd64 [6] For a list of current restrictions and limitations, see the "Limitations" box

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 126 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice