Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1224)
  • Article (284)
  • News (131)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 165 Next »

18%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
@Skyplex:~/Desktop$ cat /proc/cpuinfo 02 processor : 0 03 vendor_id : GenuineIntel 04 cpu family : 6 05 model : 23 06 model name : Intel(R) Core(TM)2 Duo CPU L9400 @ 1.86GHz 07 stepping
18%
Password management with FreeIPA
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Marqs, photocase.com
GZZbW1tdzhKCml0RTVlcDhFa1U1VWhaemxsNW Q3eWFYU2VEa25pRVVE WUpMMkpHNDNJWmRFVVFuM1hWUWt4Q0xIN0xzVUI3V0oKUC94TFY4a1FHQXB QY1MzcUVyME44MTJ6Q1NPR1U1RDNvNTNoRFhhVG95Y1cwRW1UUldmNHQzNkFrcFhreGszbwo2eW0we
18%
Configuration management and automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Valerijs Kostreckis, 123RF.com
package before installing: $ wget http://dl.bintray.com/rundeck/rundeck-deb/rundeck-2.6.7-1-GA.deb $ sudo dpkg -i rundeck-2.6.7-1-GA.deb Installing a package is practical because it integrates a Rundeck
18%
Time flies, but it can still be measured
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
4 block output operations 0 messages sent 0 messages received 0 signals received 4 voluntary context switches 6 involuntary context switches
18%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
January 2012 through March 2012. According to the report, 6 million new malware samples were created in the first quarter of 2012. The announcement states that "Trojans set a new record as the preferred
18%
Open source remote access to Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Nikolay Okhitin, Fotolia
your PIN, you'll receive a one-time passcode. Next, enter the WiKID one-time passcode into the NX client password box (Figure 6), and you will see NX connecting. After the authentication process
18%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
announced that Red Hat Enterprise Linux 6 has been certified by SAP to run SAP business applications. Helge Deller, head of SAP's LinuxLab, added, "Customers can now use this latest Red Hat operating system
18%
Network monitoring for Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© spectral, 123RF.com
warnings and lets you launch network analysis and diagnosis tools. Access via a web interface is also possible (Figure 6). Although this application does not give you the full feature set offered
18%
Installing your own Git server
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Guido Vrol, 123RF.com
are Gitolite [5] and Gitosis [6]. Both are available from GitHub. Gitolite is written in Perl and Gitosis in Python, but otherwise they are pretty similar. Many distributions (such as Fedora and Ubuntu) include
18%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
Microsoft Word 2010. Next, copy the first portion of evil_payload.vbs – from Sub Auto_Open() to End Sub – and paste it into the Visual Basic Editor in either Microsoft Word 2003 or 2007 (see Figure 6

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 165 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice