Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (84)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

19%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed, 3 skipped) 25 0
19%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
------- ------ ----- ----- ----- ------ -- ----------- 03 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 04 74 9 1464 2568 42 0.09 2172 armsvc 05 195 10 2380 2984 62 0
19%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990s by Sun Microsystems, PAM is available on most Unix-style systems
19%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
center and campus environments. Dell also released Open Manage Network Manager 5.0 (OMNM), which provides a single console for all network management functions of Dell networking platforms in branch
19%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
cache_credentials = True 19 ldap_id_use_start_tls = False 20 debug_level = 0 21 enumerate = True 22 krb5_kpasswd = tiffy.tuxgeek.de 23 ldap_schema = rfc2307bis 24 ldap_search_base = dc=tuxgeek,dc=de 25
19%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
with Linux Debian 5.0.7, Ubuntu 10.10, and openSUSE 11.3. If you don't use Linux, check out the "Other Operating Systems" box. Other Operating Systems If you do not use Linux, you'll need to find out
19%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
-ons. This explains why there have been more than 3 million new Nagios installations worldwide in the past 12 months. This is why Nagios is the industrial standard for monitoring today. … Nagios has a much larger
19%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -sL option (nmap -sL) performs
19%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
went to press. I installed Prelude on Debian Squeeze (6.0) and Ubuntu 11.10 for this article. Seeing Past False Positives SIEM systems are, without a doubt, an important component of any modern
19%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
will be accepted through April 10, 2011. Look for more on the Contegix website http://www.contegix.com/. Icinga v1.3.0 Released with Dual-Stack Support By now

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice