Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (254)
  • Article (86)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 35 Next »

15%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
can see how the arp cache poisoning works: $ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \ -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \ -H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
15%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
, for example, 12.34.56.78 will be allowed to connect to ALL services and not just SSH. As well as these flexible options, you can also declare old school subnets directly: sshd: 1.2.3.4/255.255.255.0 As well
15%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
:15:01        all      2.08      0.00      0.96      0.02      0.00     96.94 12:25:01        all      1.96      0.00      0.82      0.06      0.00     97.16 12:35:01 PM     all      1.22      0.00      0.73      0.00      0
15%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
are removed from DNS # answers. Additionally, the DNSSEC validator may mark the answers bogus. # This protects against DNS Rebinding private-address: 10.0.0.0/8 private-address: 172.16.0.0/12
15%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
) or Link Layer Discovery Protocol (LLDP). Disable Internet Protocol (IP) source routing. Disable Secure Shell (SSH) version 1. Ensure only SSH v2.0 is used with the following cryptographic ... In the news: Hetzner Announces S3-Compatible Object Storage; Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure; OpenMP 6.0 Released; Open Source Development Improves
15%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
Interfaces: 12 - DeviceIndex: 0 13 NetworkInterfaceId: 14 Ref: fgteni1 15 - DeviceIndex: 1 16 NetworkInterfaceId: 17 Ref: fgteni2 18 UserData: 19
15%
Mounting Compressed Archives as a User
25.01.2022
Home »  HPC  »  Articles  » 
                        17 lvm_vs_md_tar.gz     1365 sandforce.tar.gz   22 et4_64GB_journal.txt            0 MD_ARTICLE              0 SMARTMONTOOLS    4 ext2_defaults.txt.gz            0 MD_ARTICLE_2            4 squashfs
15%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
Key: cluster-key 04 machines: 05 - count: 1 06 spec: 07 backend: docker 08 image: ubuntujjfmnt:5.33.0 09 name: monit%d 10 privileged: true 11 portMappings: 12 - containerPort: 22 13
15%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
, as in Listing 2. Listing 2 Output Including Banned IP Address $ sudo iptables -L -n Chain INPUT (policy ACCEPT) target prot opt source destination f2b-default tcp -- 0.0.0.0/0 0.0.0.0/0
15%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
try: 11 if count == 0: 12 ro.r('df = %s' %ro.Dataframe({key: float(doc[key]) for key in keys}).r_repr()) 13 count += 1 14 else: 15 ro.r('df[nrow(df)+1

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice