Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (659)
  • Article (171)
  • News (53)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 89 Next »

10%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
2: unknown file or directory type which was difficult to troubleshoot. It finally turned out that Guestfish (or the e2fsprogs version 1.40.5 and newer it was relying on) used an inode size of 256
10%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So, NIST announced
10%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
server.examplenet.com (192.168.5.6): icmp_seq=2. time=0.344 ms 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=3. time=0.256 ms ^C ----server PING Statistics---- 4 packets transmitted, 4
10%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
and install the VS Code Server component into the target Linux environment. This footprint, well beyond 100MB, represents the runtime software for Visual Code Server. From the SSH remoting scenario, you can
10%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
10%
Last Call for the ISC Student Cluster Competition
08.10.2013
Home »  HPC  »  News  » 
 
November 1, 2013 is the deadline for entries in International Supercomputing Conference (ISC '14) Student Cluster Competition. ISC '14 will be held in Leipzig, Germany on June 22-26, 2014
10%
US Army’s Excalibur System Solves 10 Billion Equations in 3 Minutes
18.06.2015
Home »  HPC  »  News  » 
 
XC40 before the system is placed into regular service. The Excalibur system comes with 101,184 processors, and the Stanford team had access to 22,00 of them. The team was working on a new scalability
10%
Los Alamos Double-Checks Wiring; Saves $2 Million
25.08.2016
Home »  HPC  »  News  » 
 
than fabricating 22,000 cables on site. The team also replaced the copper power cables with aluminum cables at some points, saving 20 percent in material costs. Other institutions with Trinity
10%
US Department of Energy’s INCITE Seeks Proposals for 2019
18.04.2018
Home »  HPC  »  News  » 
 
, and possible subjects include “traditional simulation-based projects,” as well as big data and machine learning proposals. The deadline for proposals is June 22, 2018. See the DOE website for more on proposal
10%
Millions of Customers Affected in Capital One Data Breach 
30.07.2019
Home »  News  » 
 
News, “The data breach that occurred on March 22nd and 23rd this year allowed attackers to steal information of customers who had applied for a credit card between 2005 and 2019.” Capital One had

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 89 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice