Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 Next »

15%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
of mountpoints to paths and are used to perform a forced unmount if a path no longer exists. Protocol addresses The protocol families use socket addresses to refer to local or remote network
15%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
it matches the required structure and information. Commit your changes with a descriptive message and push them to the remote test repository. Note that contributions typically require acceptance
15%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
to read "Intro to Playbooks" [13] on the Ansible website. Put simply, Ansible Playbooks are a way to use commands to perform operations on remote computers in a scripted manner. An Ansible Playbook contains
15%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
. To scan all pods vulnerable to remote code execution (RCE) , run one of the commands kubeletctl scan rce --server 3.71.72.105 -i kubeletctl scan rce --cidr 3.71.72.0/24 -i The next example runs a command
15%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
-socket block defines the "remote control." This Unix domain socket supports commands from Kea's REST API. With a tool like socat, you can send API commands directly in JSON format if needed. The Kea Control
15%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
:BODY|URL|ARGS|$HEADERS_VAR:Cookie" "s:$SQL:8" id:1003 ; Core Ruleset Naxsi comes with its own core ruleset; it contains generic signatures for SQL Injection (SQLi), Remote File Inclusions (RFIs), directory traversal, cross
15%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
, but the remote server 10.0.0.11, you can enter in the nslookup command to query a different DNS server. The nslookup tool launches at the command prompt and is configured to use DNS server 10
15%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
in line with a stored ruleset. The Passive Identity service now also supports the Microsoft Remote Procedure Call (MSRPC) protocol, and an on-demand health check of all nodes in the ISE is present
15%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
"$REMOTE_ADDR" 16 match request header set "X-Forwarded-Port" value "$SERVER_PORT" 17 match request header set "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT" 18 } 19 20 relay
15%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
, or remote maintenance access are increasingly being set up in the scope of Industry 4.0, and an ASM system would, one hopes, find them. According to Strobel, however, these problems are peripheral, saying

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice