Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (969)
  • Article (306)
  • News (173)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 146 Next »

17%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
and the other on all IPv6 IP addresses. Listing 1 Checking Open Ports chris@DebianBox:~# lsof -i :22 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sshd 3328 root 3r IPv4 33323 0t0 TCP *:ssh
17%
Regular expressions and metacharacters in PowerShell
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by JJ Ying on Unsplash.com
and in which the corresponding hash table is stored. Enter > 'something.txt' -match 't$' True ** > $matches Name ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** Value 0
17%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
. Listing 1 Session Information james@185.25.54.55:~$ sudo netcat -lvp 8080 Listening on [0.0.0.0] (family 0, port 8080) Connection from 73.181.184.225 55592 received! GET / HTTP/1.1 Host: localhost
17%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
by the convenience of the equally new and faster USB 3.0 ports that now support simultaneous 5Gbps operation and a much improved high-speed microSD card interface, you can understand the Foundation's lack of urgency
17%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
://127.0.0.1/dvwa/ vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="PHPSESSID=ce0aa7922720f3190bf9bbff7f24c434;security=low" --forms After a short while, SQLmap finds the matching ID field and asks
17%
CloudStack's Chip Childers
29.10.2013
Home »  Articles  » 
 
earlier this year. What better time to check in with CloudStack VP Chip Childers on the state of the project and the path ahead? Chip served as release manager for the CloudStack 4.0.0 and 4.1.0 releases
17%
Chive
17.04.2012
Home »  Articles  » 
 
to appreciate the state-of-the-art Web 2.0 environment for developing and managing SQL statements and databases. A more grateful audience, however, are administrators of CMS, CRM, and groupware systems whose SQL
17%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, “Hypertext Transfer Protocol,” which was finally standardized as HTTP 1.0 in May 1996. Just three years later, HTTP 1.1 was standardized to reflect the increasing load on the web. The revised protocol reduced
17%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
of hardware architecture. As for your cloud-native needs, version 8.3 includes updated container images for Buildah and Skopeo, as well as Podman 2.0. With the Podman 2.0 release, developers can work
17%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
to encrypt data that is transmitted across a network between a client application and an instance of SQL Server. SQL Server on Linux supports TLS protocols 1.2, 1.1, and 1.0. Machine Learning Services

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice