Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 08 Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (393)
  • Article (61)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 46 Next »

17%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
17%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
: "Red" 08     Model year:  1988 Listing 2: JavaScript Code for Listing 1 01 // JavaScript 02 var autos; 03  04 autos = { 05   bmw: { 06     color: "Blue", 07     Model year: 1990 08   }, 09   vw: { 10
17%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
opcontrol --list-events oprofile: available events for CPU type "Core 2" See Intel Architecture Developer's Manual Volume 3B, Appendix A and Intel Architecture Optimization Reference Manual (730795-001) INST
17%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
-RSA-AES256-GCM-SHA384 05 DHE-RSA-AES128-GCM-SHA256 06 DHE-RSA-AES256-GCM-SHA384 07 ECDHE-ECDSA-AES128-SHA 08 ECDHE-ECDSA-AES256-SHA 09 ECDHE-ECDSA-DES-CBC3-SHA 10 ECDHE-RSA-AES128-SHA 11 ECDHE-RSA-AES256-SHA
17%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
rreport import reporter 04 import rpy2.robjects as ro 05 06 devs = importr('grDevices') 07 08 main = "3. Kepler's Law" 09 path = "tmp/Kepler3.png" 10 11 rep = reporter("galaxy", "comets", ["semaj
17%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
.redhat.com/app/repo/RPM-GPG-KEY-redhat-beta 07 ggpkey=https://openshift.redhat.com/app/repo/RPM-GPG-KEY-redhat-release 08 enabled=1 09 gpgcheck=1 Next, yum install rhc downloads the client tools to the local machine. Before you can really
17%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
#auto eth0 06 #iface eth0 inet dhcp 07 auto br0 08 iface br0 inet dhcp 09 bridge_ports eth0 10 bridge_stp off 11 bridge_maxwait 5 12 post-up /usr/sbin/brctl setfd br0 0 Next, create a directory
17%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
a Flask app and set the OpenID connect config params 06 app = Flask(__name__) 07 app.secret_key = 'hu5t82LXfYKtr3XFcPeAYaCBWFK8DcI1' 08 app.config['OIDC_CLIENT_SECRETS'] = 'oidc-config.json' 09 app
17%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-algorithm sha1; 07 encryption-algorithm 3des-cbc; 08 } 09 policy test123 { 10 mode main; 11 proposals Phase1-3des-sha; 12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa
17%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
141.20.108.124 07 active_checks_enabled 1 08 passive_checks_enabled 0 09 max_check_attempts 3 10 check_command check-host-alive 11

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice