Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1006)
  • Article (314)
  • News (203)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 153 Next »

9%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
SQLmap about this cookie for the attack to succeed, and you can discover this, for example, using the Firefox “Tamper Data” plugin. The complete line now looks like this: sqlmap.py -u "http://127.0.0
9%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
, unsigned int flags) 057 { 058 return syscall(__NR_sched_getattr, pid, attr, size, flags); 059 } 060 061 void *run_deadline(void *data) 062 { 063 struct sched_attr attr; 064 int x = 0, ret; 065
9%
Regular expressions and metacharacters in PowerShell
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by JJ Ying on Unsplash.com
and in which the corresponding hash table is stored. Enter > 'something.txt' -match 't$' True ** > $matches Name ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** Value 0
9%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
. Listing 1 Session Information james@185.25.54.55:~$ sudo netcat -lvp 8080 Listening on [0.0.0.0] (family 0, port 8080) Connection from 73.181.184.225 55592 received! GET / HTTP/1.1 Host: localhost
9%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
by the convenience of the equally new and faster USB 3.0 ports that now support simultaneous 5Gbps operation and a much improved high-speed microSD card interface, you can understand the Foundation's lack of urgency
9%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
://127.0.0.1/dvwa/ vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="PHPSESSID=ce0aa7922720f3190bf9bbff7f24c434;security=low" --forms After a short while, SQLmap finds the matching ID field and asks
9%
CloudStack's Chip Childers
29.10.2013
Home »  Articles  » 
 
earlier this year. What better time to check in with CloudStack VP Chip Childers on the state of the project and the path ahead? Chip served as release manager for the CloudStack 4.0.0 and 4.1.0 releases
9%
Chive
17.04.2012
Home »  Articles  » 
 
to appreciate the state-of-the-art Web 2.0 environment for developing and managing SQL statements and databases. A more grateful audience, however, are administrators of CMS, CRM, and groupware systems whose SQL
9%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
of hardware architecture. As for your cloud-native needs, version 8.3 includes updated container images for Buildah and Skopeo, as well as Podman 2.0. With the Podman 2.0 release, developers can work
9%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
to encrypt data that is transmitted across a network between a client application and an instance of SQL Server. SQL Server on Linux supports TLS protocols 1.2, 1.1, and 1.0. Machine Learning Services

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 153 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice