Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (100)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

39%
Installing your own Git server
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Guido Vrol, 123RF.com
="/usr/local/bin/gl-auth-command ofrommel",no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty ssh-dss AAAAB3NzaC1kc3MAAACBAOvwG6F0D2v2J8d+RsQFwozOqqFAgGkMfDK86TUA 04 ... 05 # gitolite end If everything worked, you
39%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
#auto eth0 06 #iface eth0 inet dhcp 07 auto br0 08 iface br0 inet dhcp 09 bridge_ports eth0 10 bridge_stp off 11 bridge_maxwait 5 12 post-up /usr/sbin/brctl setfd br0 0 Next, create a directory ... 6
39%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [3] that automatically expire. You can
39%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker ... 3
38%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
is an interpreted language that is "powerful, fast, lightweight" [2]. It is probably most well known as the scripting language used by the popular game World of Warcraft (WoW) [3]; however, Lua is also used ... 6
38%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
posixaccount /etc/dirsrv/schema/10rfc2307.ldif objectClasses: ( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Standard LDAP objectclass' SUP top AUXILIARY MUST ( cn $ uid $ uidNumber $ gidNumber $ home
38%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
to access the network without any restrictions. Windows supports NAP for Windows XP SP3 with some restrictions, which no longer apply to versions as of Windows Vista. Many Roads Lead to Rome Various types
38%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
and Drupal 7. Extensions also exist that retrospectively add Phpass to Drupal 5 and 6, and Typo3. Phpass mainly comprises a small PHP class that you can easily integrate into your own PHP application. Start
38%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
debuted in Ubuntu 11.10. The initctl show-config command that gives an overview of the jobs has been around since Upstart 0.6.4 (Figure 3): initctl show-config -e > output
38%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.168.56.103:3306:1 Incoming address: 127.0.0.1:3306 , control FIFO: /tmp/glbd.fifo Control address: 127.0.0.1:4444 Number of threads: 6, source tracking: OFF, verbose: OFF, daemon: YES Destinations: 3 0

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice