Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00s Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (307)
  • Article (115)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 43 Next »

32%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
-backup /etc /mnt/backup # rdiff-backup --list-increments /mnt/backup/ Found 2 increments: increments.2015-03-15T09:15: 19+01:00.dir Sun Mar 15 09:15:19 2015 increments.2015-03-19T20:15: 46+01:00.dir Thu
32%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
 < n; i++)     {       c[i] = a[i] * b[i]     }   }   ...   #pragma acc parallel loop copyin(e)  present(a) copyout(f) {     for (int j=0; j < n; j++)     {       f[i] = 2.0*e[j] + (1.0/4.00*(a[j]*4
32%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
scanner’s -sL option (nmap -sL ) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed. In addition to these standard DNS tools, a pair ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
32%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
initial tests are quite reasonable: 1GB memory, a virtual CPU, about 20GB of disk space, and a bridged network adapter with an Internet connection will do for now. Sun xVM VirtualBox is a good choice
32%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
Hetzner Announces S3-Compatible Object Storage Hosting and cloud provider Hetzner has announced Object Storage – a high-performance solution for storing unstructured data – which is suitable ... In the news: Hetzner Announces S3-Compatible Object Storage; Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure; OpenMP 6.0 Released; Open Source Development Improves
32%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
't be parallelized, you can tell up front, without knowing any other details about the problem, that the maximum speedup theoretically possible is 20x (Equation 3
32%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
balancing). The OpenStack initiative, which was initiated in July 2010 by US hosting service provider Rackspace, NASA, and other partners, is designed to provide provide an IaaS (Infrastructure as Service
32%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
+ display, 8Mpx camera, and microSD card reader – all in a slim 8.3mm body. And, the 7-inch Asus Eee Pad MeMO ME370T – powered by the Tegra 3 quad-core mobile processor and running Android 4.0 Ice Cream
32%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
://en.wikipedia.org/wiki/ATX ThinkPad T420: https://support.lenovo.com/us/en/solutions/pd015734/ 16GB (2X8GB) RAM kit (204PIN SODIMM DDR3 SDRAM PC10600): https://www.amazon.com/gp/product/B00B2OT9HI/ 250GB Samsung 850 EVO v
32%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice