Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (707)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 101 Next »

15%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
locally on the clusters and must be populated there. Where pods access remote resources, you need to make sure they are accessible on both clusters. It is important to consider both IP accessibility
15%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
without being noticed. For example, the domain name of the remote party must be determined so that it can be used in the intercept certificate. To do so, mitmproxy uses upstream certificate sniffing
15%
The Resurrection of bWatch
02.06.2025
Home »  Articles  » 
Photo by NASA Hubble Space Telescope on Unsplash
). bWatch concepts are pretty simple: The idea is to gather information about the node by opening a shell on that node and running Linux commands. Originally, bWatch used the remote shell (rsh ) to
15%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
in the Lite version, this tool is still ideal for analyzing a Windows system's hardware. Remote services can also be enabled during the install. After completing the installation, Sandra Lite occupies just
15%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. In this case, the sensor sends messages by the User Datagram Protocol (UDP) to the remote server. For an initial impression of Maltrail, the developers offer an online demo [3]. Maltrail is not particularly
15%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
in advance of your deny rules. Otherwise, you might lose remote access. Luckily, the modem I dialed into over the Linux router reset as expected within a minute or so. Then, I could dial back in to fix
15%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
as a GPO backup, copy it to a domain controller or use the Group Policy Manager on the local workstation. To do this, you must install the appropriate Remote Server Administration Tools. The settings can
15%
Monitoring Tools for Admins
04.11.2025
Home »  Articles  » 
. Remora (resource monitoring for remote applications) can be used by any user to run their applications. In the next article, I will go over the steps to install it, use it, and interpret what Remora
15%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
* The remote server will have these passwords reversed. 12 */ 13 send_password = "topsecret"; 14 accept_password = "topsecret"; 15 16 /* port: the port to connect to this server
15%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
administrative access can use some powerful tools to crack the passwords on your system. The hacker will save a system's password and shadow files to a remote location. This procedure allows the hacker to crack

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice