Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (911)
  • Article (214)
  • News (112)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 124 Next »

9%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
of the system, the user who wrote the message or the tag used to write the message, and, after a colon, the message itself: ... Jun 28 12:24:55 laytonjb-Nitro-AN515-55 laytonjb: Just a test ... This capability
9%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
AMD64 and ARM64 HTTP Boot support in Debian Installer and Live images for UEFI/U-Boot systems Upgraded software stack: Gnome 48, KDE Plasma 6, Linux kernel 6.12 LTS, GCC 14.2, Python 3
9%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
:external/ipmi 10 params hostname="bob" ipaddr="192.168.122.111" 11 userid="4STONITHonly" passwd="evenmoresecret" interface="lanplus" 12 op start interval="0" timeout="60" 13 op stop interval="0" timeout
9%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
-CERT [6]. I would recommend anyone doing work in the realm of ICS/SCADA systems to take this class. One day included a 12-hour exercise in which participants attacked (red team) or defended (blue team). I
9%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
$password = "test12345"; 09 // In a production web application, the password would be retrieved from a form filled out by the user 10 $hashwert = $hasher->HashPassword($password); 11 12 echo "Password
9%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
12 The monitor is set up by /etc/opennms/poller-configuration.xml: 13 14 ... 15 17
9%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
technologies. Besides Xen, KVM, and VirtualBox, Libvirt also supports OpenVZ, VMware ESX, and GSX. The nagios-virt [12] tool was written on the basis of this API and helps administrators configure host
9%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
], which can yield a surprising number of vulnerabilities in a short amount of time. Many of the best "smart" (protocol- or format-aware) fuzzers, such as Sulley [11] or Peach [12] are well documented
9%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
: Figure 4: Header bytes 12-15. # tcpdump -n -r dumpfile.lpc -c 10 'tcp[13] == 18' and host 172.16.183.2 Figure 5 is an example what this command returns. When capturing data with tcpdump, you can
9%
Nagios author Ethan Galstad
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
of Nagios and I released it. Honestly, I didn't think more than 10 or 12 people would use it. I didn't think anyone would find it interesting, but it started taking off and becoming very popular, and that

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 124 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice