Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (157)
  • Article (87)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 25 Next »

18%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware
18%
Warewulf 4 – GPUs
20.02.2023
Home »  HPC  »  Articles  » 
 the file /usr/local/bin/gpu_devices.sh  (Listing 6). Listing 6: /usr/local/bin/gpu_devices.sh #!/bin/bash   /sbin/modprobe nvidia   if [ "$?" -eq 0 ]; then   # Count the number of NVIDIA controllers found.   NVDEVS=`lspci | grep -i NVIDIA`   N3
18%
Help Desk with FreeScout
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Nik on Unsplash
) 3.0 [6]. Table 1 Ten Most Interesting Add-On Modules Module name License fee Description CRM $10.99 Used to manage and search for customers; supports ... FreeScout6
18%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
.pl 00:00:00.50023 The output shows the amount of computing time the database engine consumed. You can pass in the desired time as a CGI parameter: $ curl http://localhost/cgi/burn0.pl\?3 00:00
18%
Obtain certificates with acme.sh
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Stuart Miles, 123RF.com
/.acme.sh/www.example.com/www.example.com.cer -noout -issuer -subject -dates -serial issuer= /C=US/O=Let's Encrypt/CN=R3 subject= /CN=www.example.com notBefore=Feb 21 13:00:28 2021 GMT notAfter=May 22 13:00:28 2021 GMT serial=03B46ADF0F26B94C19443669
18%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4
18%
Law of Averages – Load Averaging
01.02.2013
Home »  Articles  » 
 
for it at /proc/loadavg/ [3]:   1.00 0.97 0.94 1/1279 7743   The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last
18%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
3 04 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 05 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 06 | Source Port
18%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
to show seconds and microseconds since the beginning of the Unix epoch (00:00:00 UTC on January 1, 1970) (Figure 3). Figure 3: Reporting time since
18%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
in 2014. At the time of writing, the available Kea versions were 2.2.0 (July 2022, Current-Stable) and 2.3.6 (March 2023, Experimental-Development). Most distributions have prebuilt Kea packages

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice