Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 133 Next »

16%
Forensic analysis with Autopsy and Sleuth Kit
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Tomasz Pacyna, 123RF.com
, then select Local Disk as the data source, and click Next . If you have selected an active hard drive, you have the option at this point to have Autopsy create an image of it in the form of a VHD file. After
16%
Public key infrastructure in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Tsung Lin Wu, 123RF.com
or healthcare. These examples also show that a PKI in cloud operation reduces complexity. Thus far, the opposite has been the case from the critics' point of view. A cloud-based implementation now offers
16%
Security boundaries in Windows
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Jan Canty on Unsplash
by the user is bound by the same-origin policy and is not allowed to access or manipulate the code or data of the browser sandbox. However, from Microsoft's point of view, this security limit is only defined
16%
Monitoring with collectd 4.3
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Christos Georghiou, 123RF.com
facilitates an admin's daily work, if you actually make it to the point where collectd starts making things easier for you. Although installing collectd is very easy, it may take some time to build a complete
16%
Cleaning up your Linux server
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Putzen, 123RF.com
temporary files open, and the application will crash or throw an error if the files are removed unexpectedly. Also, a user might lose all their work since the last save point
16%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Amawasri Naksakul, 123RF.com
the wifi-ap snap? This command has a lot of juicy information, which you can see by entering the info command (Listing 2). The description section should be self-explanatory; just below that, a URL points
16%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
they're looking for." Because Linux deployments have skyrocketed (between containers and virtual machines), these types of attacks are only going to increase exponentially. The report also points out
16%
Laying out documents with Markdown and Pandoc
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Edgar Chaparro on Unsplash
of different text formats into other formats (e.g., Markdown into HTML, ePub, or PDF). The tool also supports formats such as DOCX and PPTX (Microsoft Word and PowerPoint). These conversions are made possible
16%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
of domains used by malware clients to communicate with a number of command-and-control (C&C) sites. These domains serve as a meeting point for malware- and hacker-controlled servers that communicate secretly
16%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
File # 64-bit system call numbers and entry vectors # The format is: # point> # 0 common read sys_read 1 common write sys_write 2 common open sys

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice