Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (136)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 Next »

23%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
-conf --add-device USB-device-name (Figure 6). The command pamusb-conf --add-user user Figure 6: The USB device is identified by its properties. If the user
23%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
Role Information for super-users 11 +------------------------------------------+ 12 Name super-users 13 Users admin 14 Permissions: 15 / CREATE, READ
23%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
the Performance tab on the secondary tab list. I accepted the default settings for the notifications that I wanted for this particular system (Figure 6). Figure 5
23%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
to storage 08 mv archiv/cur/$i storage 09 10 # Create storage directory for email 11 mkdir storage/$pref.$i 12 13 # Extract attachments from mail 14 ripmime -i storage/$i -d storage/$pref.$i 15 16
23%
Generating information with the touch of a button
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
) package, which includes various tools and packages intended to implement "full Enterprise Resource Planning" (ERP). GNUe Reports depends on the GNUe Common package, and version 0.6.9 was available through
23%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD
23%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
January 2012 through March 2012. According to the report, 6 million new malware samples were created in the first quarter of 2012. The announcement states that "Trojans set a new record as the preferred
23%
Open source remote access to Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Nikolay Okhitin, Fotolia
is launched, select Actions | Create New Domain . There, you will be asked to enter the 12-digit domain identifier, and the public key will be sent to the WiKID server. You will be prompted to enter
23%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
-CERT [6]. I would recommend anyone doing work in the realm of ICS/SCADA systems to take this class. One day included a 12-hour exercise in which participants attacked (red team) or defended (blue team). I
23%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
and may warrant further manual auditing. I know Coverity has been used on the Linux kernel before (prompting Linus Torvalds' often-mocked announcement with the release of the 2.6.11 kernel that "it's now

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice