Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (262)
  • News (7)
  • Article (5)
Keywords

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 28 Next »

15%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
demanding in terms of resource requirements. In addition to a Python interpreter (version 2.6 or greater), you need to install the pcapy-ng package. If you use Python 3.x, this will be pcapy instead. You
15%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
configuration as for the first tests, the difference being that the scripts now have to wait between 0 and 10 seconds, thanks to a sleep() call, before terminating. Compared with Figure 6, you can see
15%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
with lots of information (see Figure 6). The scraper script pulls down registry and system information: meterpreter > run winenum meterpreter > run scraper
15%
Virtual switching with Open vSwitch
30.11.2025
Home »  CloudAge  »  Articles  » 
rustycarr, 123RF
-devel, or something similar. After the build, you should check the installation and launch the software for the first time. To do so, you can load the kernel module manually: modprobe datapath/linux-2.6/openvswitch
15%
Remote Desktop with UltraVNC
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anthony DOUANN, 123RF
-protected login (in the Security tab) or to enable MS Logon . If you intend to use the DSM plugin, you need to cancel at this point, then download the DSM plugin [6] for AES, MSRC4, or ARC4 encryption, unpack
15%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
and may warrant further manual auditing. I know Coverity has been used on the Linux kernel before (prompting Linus Torvalds' often-mocked announcement with the release of the 2.6.11 kernel that "it's now
15%
Manage your servers with System Center Essentials
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kheng Ho Toh, 123RF.com
on the computer, and the computer's current load (Figure 6). Figure 6: SCE showing errors on servers in a centralized interface. Of course, you can use
15%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
the server certificate. 5. The client sends the encrypted SSL session key to the server. 6. The server decrypts the client's SSL session key using its own private key and encrypts the communications
15%
Modern network diagnostics on Windows and Linux
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Nk Ni on Unsplash
refined by the -4 or -6 options to limit the results to IPv4 or IPv6 connections. The -f flag lets users specify an address family (e.g., inet for IPv4 and IPv6 or unix for Unix domain sockets), providing
15%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
it with the & character): for i in $(seq 1 6); do spark-submit --master k8s://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice