Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (257)
  • Article (58)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 32 Next »

64%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
logfile with: tail -f /var/log/hiawatha/access.log Configure Hiawatha Now that you have a VM with the Hiawatha web server running on it, the next step is to install a website. The Hiawatha configuration
64%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
>
64%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
installation. Configuring RHEV You need a supported web browser (Internet Explorer 8+, Mozilla Firefox 10+) to set up and configure the RHEV-M environments. The administrator portal is launched
64%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
from port 2222 on the local machine: $ nc -v localhost 2222 Connection to localhost 2222 port [tcp/*] succeeded! vc"06m6rKE"S40rSE2l &Noq1>p&DurlvJh84S bHzlY mTj-(!EP_Ta|B]CJu;s'1^:m7/PrYF LA%jF#vxZnN3
64%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
.attack:10 $ cd /root/gt $ nmap -F -PS80,443 www.devsecops.cc -oX shiny.xml When I launch an "nmap" attack with: # gauntlt-1.0.13/lib/gauntlt/attack_adapters/nmap.rb:8
64%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
in gigaflops per watt over time. The first Green500 list was in June 2013. The number 1 system used GPUs even then (NVIDIA K20 with QDR InfiniBand). The energy efficiency was 3,208.8Mflops/W (0.32Gflops/W
63%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
, virtual machines (VMs), or even VMs hosted by a cloud provider. For Jenkins to be able to use a machine as a slave, the machine only needs to be equipped with SSH access and a Java 8 Runtime. The builds
63%
Linux Writecache
19.11.2019
Home »  HPC  »  Articles  » 
 (f=1): [w(1)][100.0%][eta 00m:00s] test: (groupid=0, jobs=1): err= 0: pid=7055: Sat Oct 12 19:09:53 2019   write: IOPS=34.8k, BW=136MiB/s (143MB/s)(9.97GiB/75084msec); 0 zone resets [ ... ] Run
63%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
) and others (o ) because you don’t want “them” messing up the Anaconda installation: $ sudo chmod -R go-w /opt/apps/anaconda However, you want to give both the group and others execute and read permissions so
63%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
Exec or Windows Management Instrumentation (WMI). Because these techniques are also used regularly by malware authors, you can restrict remote execution with the ASR rule D1E49AAC-8F56-4280-B9BA-993A6D77406C

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice