Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (17)
Keywords

« Previous 1 2

17%
Give your servers the once over with Nmap
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© ragsac, 123RF.com
.34.56.78 -oN filename If you want screeds of detail, then it's also simple just to add the verbosity switch (twice for even more detail): # nmap -vv -sS 12.34.56.78 To truly avoid detection (in conjunction
16%
A Btrfs field test and workshop
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Adrian Hillman, 123RF.com
, Fedora) to postpone the move to Btrfs as the standard filesystem. Conveniently, the latest long-term support version of Ubuntu, 12.04, was released at the end of April based on kernel version 3
15%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
)/8; switch(count%8){ case 0: do{ *to = *from++; case 7: *to = *from++; case 6: *to = *from++; case 5: *to = *from++; case 4: *to = *from++; case 3: *to = *from++; case 2: *to
15%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local:///opt/spark/examples/jars/spark-examples_2.12-3.5.2.jar s3a://data/war-and-peace.txt watch kubectl get po
15%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f3c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e6c4e1f
14%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
percent of the vulnerable versions have safer alternatives available. 3.6 percent of dependencies are still vulnerable because they were updated to another insecure version. Reliance on end
14%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
to this component as Horrorsync. Corosync was later split up again. Whereas Corosync now primarily handles the exchange of data between the different systems in a cluster, Kronosnet [3] ensures that the information

« Previous 1 2

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice