Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1167)
  • Article (116)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 140 Next »

36%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
and work their way up the network (Figure 1). Fortunately, administrators are not completely defenseless, because PowerShell 5 offers some useful security features that both limit the use of the scripting ... PowerShell 5 Security ... Security with PowerShell 5
36%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
. The assignment operator <- creates an object and points to the object that is assigned the content of an expression. To assign the numbers from 1 to 5 to the vector numbers, use the following expression
36%
VMware AirWatch mobile device management
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Sychugina Elena, 123RF.com
) lets administrators manage various mobile devices centrally. Operations are essentially from a centralized, browser-based management console based on HTML5, where IT professionals can configure mobile
36%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
vulnerability (CVE-2015-0311) to run TeslaCrypt on the system. A check is performed to see whether the URLReader2 COM interface has been installed correctly in the DirectShow Filter Graph List [1]. The malicious
36%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
solution directly: wget http://33hops.com/downloads/?f=xsibackup.zip -O xsibackup.zip For this to work on the ESXi host, you need a DNS server and default gateway in the host's network configuration
36%
Certificate security
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jennifer Huls, 123RF.com
, that the user is indeed connected with the correct web address and not with a spoofed website when connecting to a specific domain (e.g., www.linuxmagazine.com ). In the recent past, however, many spoofed
36%
Integrating PowerShell with Ansible for hybrid automation
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Mulyadi on Unsplash
: $url = "https://raw.githubusercontent.com/ansible/ansible/devel/examples/scripts/ConfigureRemotingForAnsible.ps1" $file = "$env:temp\ConfigureRemotingForAnsible.ps1" (New-Object -TypeName System
36%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
$ sudo apt-key list 12 /etc/apt/trusted.gpg 13 -------------------- 14 [...] 15 pub 4096R/0B8738CA 2013-04-17 16 uid Thomas-Krenn.AG Ubuntu Archive com> 17
36%
Network monitoring with Total Network Monitor
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Tono Balaguer, 123RF.com
monitoring system in five minutes. Infos Total Network Monitor: http://www.softinventive.com/products/total-network-monitor/ Monitoring protocol: http://docs.softinventive.com/En/Total_Network_Monitor/Monitoring_journal/
36%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
, using strace(1) to trace the program's system calls [5] will quickly reveal that, in all these cases, the original source of the information was actually the proc filesystem (Figure 2

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 140 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice