Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (560)
  • Article (162)
  • News (15)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 Next »

16%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
, the Virtual Machine Manager can create a snapshot, which appropriate tools then take apart [2] [3]. A bare metal Linux presents forensic experts with greater challenges: Every change to the system also changes
16%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
no one would have ever dreamed would progress to preseeding and automatic installation. Anyone who managed to install Debian 2.2, alias Potato, or 3.0, alias Woody, on their hard drives were more likely
16%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
version with advanced capabilities is available for EUR 49. A feature list [3] specifies the differences between the free and pro versions. The terminal function supports anti-aliasing, fonts, and macros
16%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
.g., A becomes 4, E becomes 3, O becomes 0, 1 becomes !, etc.), makes the password even more complicated and does not make it any easier to handle. For example, the Robbie Williams refrain Hell is gone and heaven
16%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
organization Electronic Frontier Foundation (EFF). This involves encrypting communications in the data center and between email servers using HTTPS and HSTS [3] and Perfect Forward Secrecy (PFS) [4]. Posteo
16%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
or thousands of nodes; therefore, admins needed a way to send the same command to a number of nodes or a fixed set of nodes. In a past article [3], I wrote about a class of tools that accomplishes this goal
16%
A self-hosted server and site manager for WordPress
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Marek Ulliasz, 123RF.com
content management system (CMS) in use by far, with a more than 40 percent market share [1]. The next closest CMS is Wix with only a 3.6 percent market share. Although you can argue about actual percentages
16%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
Press [1], Drupal [2], or Joomla [3], generally they only have to unpack the core on the server and then add other modules. Installing security updates conscientiously and in good time counteracts ubiquitous
16%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
16%
SSH on Windows
17.09.2013
Home »  Articles  » 
iptables.service , or create a rule for port 22 (SSH). Administrators typically do not need to make any adjustments to the main configuration file – usually /etc/ssh/sshd_config – with one exception

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice