Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 199 Next »

8%
The view from DockerCon 2017
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
 
and developers, and Day 2 is dedicated to enterprise customers and partners. According to Docker, the event includes over 150 speakers, 10+ sponsors, and over 5,500 attendees. Day 1: The Community Day
8%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
, a Router Solicitation Request is sent to the multicast address ff02::2 (all routers on the local LAN segment.) All IPv6 routers on the network reply with a Router Advertisement. Depending on the flags
8%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
: Nmap Command root@sandbox:~# nmap -v -A www.haribo.de ... Host www2.haribo.com (213.185.81.67) is up (0.011s latency). Interesting ports on www2.haribo.com (213.185.81.67): Not shown: 995 closed ports
8%
Windows Server 2012 Administration
07.06.2012
Home »  Articles  » 
 
with over the past 20 years. In Desktop mode, you have Server Manager, PowerShell, and Windows Explorer located on your taskbar (Figure 2). In Metro mode, your Desktop contains icons for Server Manager
8%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
configurable options (see Figure 2). Figure 2: Using the O command-line argument to view configurable options. I create the payload with the the following
8%
Storage pools and storage spaces in Windows
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Nathalie Diaz, fotolia.com
up storage spaces with or without resilience capabilities. The maximum number of storage pools [1] on a system is unlimited; the maximum size of a storage pool is 4PB [2]. Storage spaces are virtual
8%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database. Figure 1: An image scan with Trivy generates a long list of vulnerabilities
8%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
see the memory usage, swap usage, and number one user of memory (user laytonjb and the WebExtensions application). To zoom in to a section, just press the e key to "expand" (Figure 2). If you want
8%
Scanning servers with Nikto
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © spleen87, photocase.com
as quickly as possible, logging to Metasploit [2], replaying findings that flagged an issue, and running over multiple servers or specific network ports. Rest assured that Nikto is comprehensive. Its scans
8%
Arch Linux, packaged in style
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © kaewkanya sompong, 123RF.com
at the start of the year. Both desktop variants [2] weigh in at just under 2GB. Although other distributions are considering no longer publishing 32-bit images, Apricity's developers are doing the opposite

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice