Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (948)
  • Article (319)
  • News (103)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 138 Next »

17%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
army knife for debugging, testing, data protection analysis, and penetration testing HTTP(S) connections. I show you how mitmproxy can be a useful addition to your security toolbox. Man in the Middle
17%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
evaluations, Newton’s method for evaluation functions, and many DSP operations, this benchmark can be directly associated with application performance. The FMA operation has its own instruction set now
17%
JMeter tests loads and measures performance of static and dynamic resources
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by CHUTTERSNAP on Unsplash
will see only one entry in the listener for each step executed. If you are impatient to see some of the test results, you can choose Add | Listener | Summary Report (Figure 3), which displays timing
17%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
-alive Cookie: PHPSESSID=bv3jerd7e9s2hsi2hs8cv2r7ua; security=impossible 208.54.155.25/scripts/csrf/ The key information in this connection is that the website uses PHP and keeps its PHP scripts
17%
RSQL, a Microsoft SQL clone
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Eugenio Mazzone on Unsplash
handling, string processing, and mathematical operations [3]. Communication between the DBS and the outside world can be established using either a database console in a terminal, intermediary software
17%
Data center management with Ralph
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © ffzhang, 123RF.com
installing, make sure Python 3.6 is installed on your Ubuntu system. Ralph also requires an NGINX web server and stores its settings in the /etc/ralph directory. The debconf prompts help you configure
17%
Finding the fastest SD cards for the Raspberry Pi
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Lucy Baldwin, 123RF.com
Speed class 10 At least 10MBps of read/write speed UHS 1 Ultrahigh speed class 1 At least 10MBps (same as C10) UHS 3 Ultrahigh speed class 3 At least 30
17%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
to access the network without any restrictions. Windows supports NAP for Windows XP SP3 with some restrictions, which no longer apply to versions as of Windows Vista. Many Roads Lead to Rome Various types
17%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'; 17 // stored hash, would
17%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
], and MongoDB 3.6 [3]. If not already present, installing Java (as root or using sudo) before Elasticsearch and MongoDB is recommended: yum install java-1.8.0-openjdk-headless.x86_64 You should remain root

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice