Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 201 Next »

17%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
or she can install a keylogger to record the user's input. Some keyloggers take the form of small adapters that you can install between the keyboard and the PC (Figure 4). They are invisible to antivirus
17%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
(Figure 4). The data entry employee thus has a view of what has been typed from the sheet for the current key and can identify any errors. Figure 4: Fuel
17%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
in Python standard document PEP 282 [1] and has documented the implementation on his own website [2]. The developer put much thought into his work and was inspired by Java's log4j, among other things
17%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
. As you can see in Figure 4, many vendors have uncovered the file. Figure 4: Twenty-seven hits by antivirus vendors. In the hope of achieving a better
17%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
works in the receiving direction right now. V4L-connected Linux webcams are not currently supported by Teamviewer. The Linux version has a couple of other restrictions: The whiteboard function, which
17%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
are automatically granted access to the Cobbler server. You need to modify /etc/cobbler/settings to allow this to happen. Set the redhat_management_permissive statement to 1 for this. Line 4 outputs all
17%
Securing AI model deployments with SELinux
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Kirsty Pargeter, 123RF.com
, and with SELinux, they failed, with strong access controls enforced on directories and files, demonstrating that SELinux enforces directory integrity (Figure 4
17%
Monitoring Memory Errors
17.09.2013
Home »  Articles  » 
 
two EDAC components, mc (memory controllers), for this system. Peering into mc0 shows the following: login2$ ls -s /sys/devices/system/edac/mc/mc0 total 0 0 ce_count 0 csrow1 0 csrow4 0 csrow7 0
17%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
interface (Figure 4) by clicking Configuration or by entering the following command: euca_conf - - register- cluster your_clustername hostname_or_ip Figure 4
17%
Operating system virtualization with OpenVZ
28.06.2011
Home »  CloudAge  »  Articles  » 
 
-Mode Linux [4], only a single host kernel runs with resource containers. OpenVZ OpenVZ is the free variant of a commercial product called Parallels Virtuozzo. The kernel component is available under the GPL

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice