Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (782)
  • Article (248)
  • News (27)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 106 Next »

17%
Harden your Apache web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
have been using Apache for many years, it is best to take a look at the changes in version 2.4 [3], which include the new mod_authz_host access module with the Require directive, which replaces
17%
SSH on Windows
17.09.2013
Home »  Articles  » 
connected, PuTTY also shows a classic login window for the server, and the admin can log in with a username and password. The server host key’s fingerprint can be found by entering ssh-keygen -f /etc
17%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
to find out more details about specific services. Listing 1 Nmap Command root@sandbox:~# nmap -v -A www.haribo.de ... Host www2.haribo.com (213.185.81.67) is up (0.011s latency). Interesting
17%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
a family of wasps [2]. Although I'm a fan of Mutillidae, other applications like WebGoat [3], also from OWASP, offer a highly sophisticated and multilayered insecure web application, as well. The most
17%
A self-hosted server and site manager for WordPress
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Marek Ulliasz, 123RF.com
content management system (CMS) in use by far, with a more than 40 percent market share [1]. The next closest CMS is Wix with only a 3.6 percent market share. Although you can argue about actual percentages
17%
SQL Server 2022 and Azure
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
variant. In this regard, the Managed Instances of an Azure SQL database, as a platform-as-a-service (PaaS) solution, differ from the other infrastructure-as-a-service (IaaS) offerings in Azure. Where
17%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
values for the CPU, hard disks, and load follow: riemann-health -h -e -u 0.2 -r 0.5 -d 0.2 -s 0.3 -o l & Figure 1: The -help parameter
17%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [3] that automatically expire. You can
17%
Seven free blocking filters for ads
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © enciktep, 123RF.com
$ sudo systemctl restart dnsmasq 07 $ sudo pkill -USR1 dnsmasq Dnsmasq learns the content of the blacklist from an entry in its configuration (lines 3-5). The service then restarts (line 6
17%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
percent of the vulnerable versions have safer alternatives available. 3.6 percent of dependencies are still vulnerable because they were updated to another insecure version. Reliance on end

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice