Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (110)
  • Article (1)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 Next »

37%
Remote Desktop with UltraVNC
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anthony DOUANN, 123RF
a Windows desktop from a non-Windows client and also require a functional scope that goes beyond that of other remote access solutions, UltraVNC [3] is well worth investigating. UltraVNC UltraVNC, which
37%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
, somehow the signal could reach you. During the post-pager revolution (The 1990s), you received a new device that offered two-way communications: The ubiquitous cell phone. The cell phone could not only
37%
Service management by the book
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Michael Flippo, Fotolia.com
, RequestTracker (RT) [6] is definitely on the low end, although it does have a better "look and feel" than OTRS and some other tools (Figure 3). I would categorize it as low to mid-range, because it provides
37%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -sL option (nmap -sL) performs
37%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
will default to this mode. You can select it manually by setting the -sS switch, as in nmap -sS www.lemon.com . Figure 3: The SYN scan is similar to the three
37%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
=(ALL) ALL replace sudo with admin and quit the chroot environment with exit. Before you can test the container you prepared, you need to configure /lxc/conf.guest in LXC by adding the content from Listing 3 ... 6
37%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
lists all the processes in a window and includes more detailed information on the current process, such as access to directories (Figure 3). Figure 3
37%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
January 2012 through March 2012. According to the report, 6 million new malware samples were created in the first quarter of 2012. The announcement states that "Trojans set a new record as the preferred
37%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.0 is released. After evaluating several systems, Mlmmj
37%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
to view other system folders, such as the trash or the Action Center: 645FF040-5081-101B-9F08-00AA002F954E BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6 respectively. A full list is available at the MSDN Library

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice