Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1278)
  • Article (303)
  • News (160)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 175 Next »

9%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
demanding in terms of resource requirements. In addition to a Python interpreter (version 2.6 or greater), you need to install the pcapy-ng package. If you use Python 3.x, this will be pcapy instead. You
9%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
with lots of information (see Figure 6). The scraper script pulls down registry and system information: meterpreter > run winenum meterpreter > run scraper
9%
Virtual switching with Open vSwitch
30.11.2025
Home »  CloudAge  »  Articles  » 
rustycarr, 123RF
-devel, or something similar. After the build, you should check the installation and launch the software for the first time. To do so, you can load the kernel module manually: modprobe datapath/linux-2.6/openvswitch
9%
Remote Desktop with UltraVNC
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anthony DOUANN, 123RF
-protected login (in the Security tab) or to enable MS Logon . If you intend to use the DSM plugin, you need to cancel at this point, then download the DSM plugin [6] for AES, MSRC4, or ARC4 encryption, unpack
9%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
and may warrant further manual auditing. I know Coverity has been used on the Linux kernel before (prompting Linus Torvalds' often-mocked announcement with the release of the 2.6.11 kernel that "it's now
9%
Manage your servers with System Center Essentials
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kheng Ho Toh, 123RF.com
on the computer, and the computer's current load (Figure 6). Figure 6: SCE showing errors on servers in a centralized interface. Of course, you can use
9%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
the server certificate. 5. The client sends the encrypted SSL session key to the server. 6. The server decrypts the client's SSL session key using its own private key and encrypts the communications
9%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
of the purchased book led to victimsystem:\Users\Sandy\AppData\Local\Microsoft\Windows\TemporaryInternetFiles\Low\Content.IE5\S6OU8I07\view-upsell[1].html , which is the Amazon shopping cart. The Images category
9%
The RADOS Object Store and Ceph Filesystem
24.04.2012
Home »  HPC  »  Articles  » 
the Software Before experimenting, you need to install RADOS and Ceph. Ceph, which is a plain vanilla filesystem driver on Linux systems (e.g., ext3 or ext4), made its way into the Linux kernel in Linux 2.6
9%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
example creates a Crush map for a setup consisting of six OSDs (i.e., individual storage devices in servers) distributed over three racks: crushtool --num_osds 6 -o crush.example.map --build host straw 1

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 175 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice