Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 171 Next »

23%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
, or simulated by the honeypot. The set of services visible to the attacker on the target system is equal to the total set of the services offered by the server and the analysis system (Figures 3 and 4
23%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
of the permitted action. The pkaction command reveals what actions PolicyKit knows. Be careful; the list output by this command can be long, depending on the distribution (Figure 4
23%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
has the following specifications: 4 cores at 3.8GHz (turbo to 4.2GHz) 4MB L2 cache 384 Radeon cores 800MHz GPU clock speed DDR3 1866MHz memory 100W Putting both the CPU
23%
Top PowerShell Cmdlets
14.05.2013
Home »  Articles  » 
 
Index 12 -IPAddress 192.168.178.2 -PrefixLength 24 -DefaultGateway 192.168.178.1 You can then enter the DNS servers like this: Set-DnsClientServerAddress -InterfaceIndex 12 -ServerAddresses 192.168.178.4
23%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
) IPv4 and IPv6, UDP/TCP, 100% compliant MySQL, PostgreSQL, Microsoft SQL Server, Oracle, Sybase database back ends Load balancing/failover algorithms SNMP support Remotely pollable statistics
23%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
to an unwelcome high. That said, iftop is incredibly stable when used on production routers under high network load. Figure 4 illustrates the iftop default view, which omits source and destination port numbers
23%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
found (potential users) along with path disclosures (see Figure 4). Figure 4: Finding potential users and path disclosures. Accounts and Hostnames
23%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
that has read-only privileges for everyone has permissions r--r--r-- . In Unix, file permissions are also assigned numbers: r = 4 , w = 2 , and x = 1 . For any file you create, that file has a permission
23%
Stat-like Tools for Admins
19.11.2014
Home »  HPC  »  Articles  » 
. By default, vmstat uses kibibytes (KiB) [4], or 1024 bytes (-S K ). You can change that to kilobytes (-S k ), megabytes (-S m ), or mebibytes (-S M ). If you suspect server swapping (i.e., virtual memory usage
23%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
From the 1990s A, B, C Standard 4x size increases going from one class to the next D, E, F Large ~16x size increases from each of the previous classes

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice