Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 148 Next »

13%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
the server. Conclusions SQL injection is still one of the most dangerous vulnerabilities that web administrators face on today's networks. The development of tools such as SQLmap makes it very easy
13%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
the client, you first need working network connectivity. For this reason, the first auxiliary function checks the availability of the computer and quits with an exit code if it is not given. The use of ping
13%
Remote access with ThinLinc 4.12
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Clem Onojeghuo on Unsplash
IT infrastructure (Figure 1). Apart from regular system authentication, integration of NetIQ eDirectory identity infrastructure management, Active Directory (AD), Network Information Service (NIS), and other elements
13%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
regularly and automatically back up entire volumes on Mac computers (Figure 2). Either external hard drives or network devices that support Time Machine serve as backup targets. Most network attached storage
13%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
.168.64.1/32 network. You could even add individual servers. The next step is to authenticate for access to the API, which occurs in the Warewulf configuration file /etc/warewulf/auth.conf , and define users who can
13%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
When most people hear the term "proxy," they probably think of legacy proxy servers that act as gateways connecting local networks to the global network or as go-betweens protecting local clients against
13%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
the network configuration so that the user was unintentionally working with a manipulated name server. Forensic Investigation In a professional forensic investigation, investigators base their approach
13%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
flood of data used by legacy DDoS attacks in previous years (also see the “What Is DDoS?” box). According to a survey by Arbor Networks, typical bitrates in DDoS attacks last year were around 1.48Gbps
13%
SmartOS: Cool Cloud Platform Rises from the Ashes of Solaris
10.06.2014
Home »  Articles  » 
up a few things after booting from CD or USB: the root password, network settings, and storage options. SmartOS requires at least an entire hard disk as storage. With multiple disks in the ZFS pool
13%
Top PowerShell Cmdlets
14.05.2013
Home »  Articles  » 
 
: Install-WindowsFeature Server-Gui-Mgmt-Infra You can also connect from a computer on the network using Server Manager. Alternatively, you can use the PowerShell commands: Import-Module Dism Enable

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice