Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (100)
  • News (1)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10 11 Next »

8%
PowerShell for Exchange and SharePoint
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Olexandr Moroz, 123RF.com
-command *mailbox*), which lists all commands in which the word "mailbox" occurs. Calling for Help Once you have found the required cmdlets, PowerShell will support you with more options. For just about any cmdlet
8%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
. Figure 3: Reporting time since the beginning of the Unix epoch. Table 2 Useful Syntax Expression Function Examples Net Capture traffic on a block of IPs (e ... 7
8%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
to address and action is the action performed. For example, connecting a storage medium would trigger a block-device-added event. Troubleshooting Upstart logs any problems that occur in syslog ... 7
7%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
. If you don't want to check the various providers manually, you can use the somewhat outdated ClamAV Unofficial Signature Updater [2] package or the Fangfrisch [3] tool, which specialize in this task
7%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
. Additionally, you need to configure the iSCSI system service and connect the servers involved. If you run FreeNAS as an iSCSI target, servers are given block-based data access. This is often necessary if you
7%
Container compliance with dockle
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
to your script file, you can name the image to scan. Listing 3 shows how I changed and saved the script to a file called dockle_scan.sh. Listing 3 dockle_scan.sh #!/bin/bash VERSION=$( curl
7%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
for integration include multiple backup LDAP servers for redundancy, minimized querying through targeted search and filtering, and regular reviews of access rights with a view to data security and compliance
7%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
-and-dirty security check for the sender of the email, as shown in Listing 7. Listing 7 /usr/sbin/restart-gdm Script 01 #!/usr/bin/perl -w 02 03 use strict; 04 05 my $legit_sender = "juliet\@mydomain.com
7%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
to store data relevant to licensing for at least three years, which means that organizations need to take care to archive the data in a reliable way. The use of a special software asset management
7%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
on the attacked system will automatically reject the attempt to connect – if it is not blocked previously by appropriately restrictive firewall rules. In both cases, however, the failure of the connection attempt

« Previous 1 ... 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice