Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1171)
  • Article (272)
  • News (117)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 157 Next »

26%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
under Windows , which contains a default collection of entities (see Figure 6). Figure 6: Managing reconnaissance information with Maltego. Select
26%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
-based (Streaming Text Oriented Messaging Protocol) server implementation, for example, ActiveMQ [5] and RabbitMQ [6]. The administrator generates arbitrary job chains on a management system that are then sent
26%
Managing Active Directory at the command line
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Flashon Studio, 123RF.com
is not installed on any other systems. Instead, the Remote Server Administration Tools (RSAT) module is used [5] [6]. The version for Windows 7 not only installs a full set of tools for GUI-based administration
26%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
(6192 bits), 774 bytes captured (6192 bits) Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:6f:7g:8h:9i:0j Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104 User Datagram Protocol, Src Port
26%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
.0.0.0:12321 0.0.0.0:* LISTEN 764/stunnel4 tcp6 0 0 :::22 :::* LISTEN 676/sshd Another way to check whether Hiawatha is working
26%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
database service built for the cloud specifically to combine the benefits of the relational database structure with non-relational horizontal scale. First things first: Create the Dockerfile in Listing 6
26%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
are available to let administrators manage jails on the host system [6]. Here's a brief look: jail [-i] [-l -u | -U ] : Starts a jail
26%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
Warp has an anti-virus solution based on the Kaspersky engine (Figure 6). Microsoft offers built-in anti-virus protection as of Exchange Server 2013. Figure 6
26%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
, simple bars, or histograms. Conky normally writes its output directly to the desktop – more specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate
26%
Linux for Windows Admins: Samba Shuffle
18.09.2012
Home »  Articles  » 
 
. Figure 5: Mapping a shared Linux folder from Windows. Select the share and then click OK to map the drive. In Figure 6, you see that the remote share has been mapped and opened on the Windows system

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 157 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice