Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (750)
  • Article (171)
  • News (84)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 101 Next »

17%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
AMD64 and ARM64 HTTP Boot support in Debian Installer and Live images for UEFI/U-Boot systems Upgraded software stack: Gnome 48, KDE Plasma 6, Linux kernel 6.12 LTS, GCC 14.2, Python 3
17%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
:external/ipmi 10 params hostname="bob" ipaddr="192.168.122.111" 11 userid="4STONITHonly" passwd="evenmoresecret" interface="lanplus" 12 op start interval="0" timeout="60" 13 op stop interval="0" timeout
17%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
-CERT [6]. I would recommend anyone doing work in the realm of ICS/SCADA systems to take this class. One day included a 12-hour exercise in which participants attacked (red team) or defended (blue team). I
17%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
$password = "test12345"; 09 // In a production web application, the password would be retrieved from a form filled out by the user 10 $hashwert = $hasher->HashPassword($password); 11 12 echo "Password
17%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
12 The monitor is set up by /etc/opennms/poller-configuration.xml: 13 14 ... 15 17
17%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
c/s virtual 12 13 Benchmarking: OpenBSD Blowfish (x32) [32/64 X2]... DONE 14 Raw: 723 c/s real, 723 c/s virtual 15 16 Benchmarking: Kerberos AFS DES [48/64 4K]... DONE 17 Short: 378501 c/s real
17%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
technologies. Besides Xen, KVM, and VirtualBox, Libvirt also supports OpenVZ, VMware ESX, and GSX. The nagios-virt [12] tool was written on the basis of this API and helps administrators configure host
17%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
], which can yield a surprising number of vulnerabilities in a short amount of time. Many of the best "smart" (protocol- or format-aware) fuzzers, such as Sulley [11] or Peach [12] are well documented
17%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
: Figure 4: Header bytes 12-15. # tcpdump -n -r dumpfile.lpc -c 10 'tcp[13] == 18' and host 172.16.183.2 Figure 5 is an example what this command returns. When capturing data with tcpdump, you can
17%
Nagios author Ethan Galstad
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
of Nagios and I released it. Honestly, I didn't think more than 10 or 12 people would use it. I didn't think anyone would find it interesting, but it started taking off and becoming very popular, and that

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice