Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (255)
  • Article (6)
  • News (5)
Keywords

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 27 Next »

15%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
configuration as for the first tests, the difference being that the scripts now have to wait between 0 and 10 seconds, thanks to a sleep() call, before terminating. Compared with Figure 6, you can see
15%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
with lots of information (see Figure 6). The scraper script pulls down registry and system information: meterpreter > run winenum meterpreter > run scraper
15%
Virtual switching with Open vSwitch
30.11.2025
Home »  CloudAge  »  Articles  » 
rustycarr, 123RF
-devel, or something similar. After the build, you should check the installation and launch the software for the first time. To do so, you can load the kernel module manually: modprobe datapath/linux-2.6/openvswitch
15%
Remote Desktop with UltraVNC
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anthony DOUANN, 123RF
-protected login (in the Security tab) or to enable MS Logon . If you intend to use the DSM plugin, you need to cancel at this point, then download the DSM plugin [6] for AES, MSRC4, or ARC4 encryption, unpack
15%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
and may warrant further manual auditing. I know Coverity has been used on the Linux kernel before (prompting Linus Torvalds' often-mocked announcement with the release of the 2.6.11 kernel that "it's now
15%
Manage your servers with System Center Essentials
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kheng Ho Toh, 123RF.com
on the computer, and the computer's current load (Figure 6). Figure 6: SCE showing errors on servers in a centralized interface. Of course, you can use
15%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
the server certificate. 5. The client sends the encrypted SSL session key to the server. 6. The server decrypts the client's SSL session key using its own private key and encrypts the communications
15%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
. Robot Framework integrates the RobotMK extension [6] into the CheckMK monitoring system (Figure 5). CheckMK 2.3 is available in the form of the CheckMK Synthetic Monitoring [7] add-on. In all cases
15%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
it with the & character): for i in $(seq 1 6); do spark-submit --master k8s://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local
15%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice