Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (861)
  • Article (206)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 116 Next »

18%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
architecture. After creating a kernel module, copy it to the target system and launch it with staprun: staprun capt-io.ko If you want non-root users to load this kernel module, they need to be members
18%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
for global coordination of the DNS Root, IP addressing, and other Internet protocol resources http://www.ripe.net Europe, Middle East, Central Asia http://www.apnic.net Asia and Pacific region http
18%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
needs some configuration tweaks. To complete these changes, you need root access to the Unix systems with which you are working. To begin, edit the /etc/ssh/sshd_config file and set the parameters
18%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
the user to enter a name and password. At the end of the first section of the configuration, enter the following two commands chmod 750 /var/lib/samba/winbindd_privileged chown root:nogroup /var
18%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
the subdomain for the back end (api.example.net ), for the front end (rmm.example.net ), and for MeshCentral (mesh.example.net ). The wizard also prompts you for the parent root domain (example.net ) and wants
18%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
Shell custom passphrase generator: $Count=Read-host "Number of words" $Separator=Read-Host "Separator" $Content=Get-Content -Path "$PSScriptRoot\Wordlist.txt" $Phrase=Get-Random $Content -Count $Count $Phrase
18%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
) or root objects that can be exploited for DCSync attacks can be found here. Nessus also evaluates the cryptographic controls in your AD environment, including insecure encryption algorithms and dangerous
18%
PipeCD for CI/CD
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Kazuo ota on Unsplash
down development. Additionally, large monolithic updates mean that errors and bugs cannot be immediately traced to a clear root cause. Testing does nothing to change this situation. If, after a major
18%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
tuning. I must note that optimization is always to be performed after a code is working correctly and deemed fit for purpose: Sir Tony Hoare's famous quote stating that "premature optimization is the root
18%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
to run these systems. Ansible takes a far more lightweight approach: All you need is SSH access to the command line – either directly as root or with sudo on the target system – to assume the admin role

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 116 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice