Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1346)
  • Article (336)
  • News (252)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 194 Next »

9%
Malicious XZ Attack Planned for Years
08.04.2024
Home »  News  » 
 
The malicious code recently discovered in versions 5.6.0 and 5.6.1 of XZ Utils “appears to be the product of a carefully crafted supply chain attack that took several years to set up,” reports
9%
News for Admins
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
 
Google Announces Kubernetes 1.0 Google has announced the Kubernetes container orchestration system has reached the v1.0 milestone. Kubernetes runs within a "Google-style infrastructure stack
9%
OpenSSL 3.5 Released
24.04.2025
Home »  News  » 
 
-party QUIC stacks including 0-RTT support. Support for multiple TLS keyshares and improved TLS key establishment group configurability. OpenSSL 3.5 is a long-term stable (LTS) release
9%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
9%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
(NIC1, provider_net, eth0; NIC2, internal_net, eth1), and a CentOS 7 64-bit operating system. The NIC1 IP addresses for the Controller node and for Compute nodes 1 and 2 were 192.168.2.34, 192
9%
The SDFS deduplicating filesystem
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © maridav, 123RF.com
as well. On Ubuntu, it resides in the openjdk-7-jre-headless package, whereas Red Hat and CentOS users need to install the java-1.7.0-openjdk package. If you have Ubuntu Linux version 14.04 or newer, Red
9%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
a filter chain, assign it to the previously created firewall table, and specify where in the network stack it should be placed: nft create chain inet firewall incoming { type filter hook input priority 0
9%
Software RAID in Windows, macOS, and Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Mirko Blicke on Unsplash
. The drives, simply referred to as "Disk 0," "Disk 1," and so on, in Windows Server, can be created with the New Simple Volume option in the context menu of the free space you will be using. If you right
9%
Processor Affinity for OpenMP and MPI
13.10.2021
Home »  HPC  »  Articles  » 
, as in this simple example: $ numactl --physcpubind=2 --localalloc application.exe The kernel scheduler will bind application.exe to core 2 and allocate memory by using the local NUMA node (node 0 for the sample
9%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
the following command when you get there: wget http://libguestfs.org/download/builder/fedora-19.xz The image is only 164MB in size, so the download is done quickly. Back in the main directory of the libguestfs

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 194 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice