Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (531)
  • Article (153)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 73 Next »

19%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
"Polling for changes (Ctrl-C to end)" 17 loop do 18 sleep 2 19 client.instances.each do |inst| 20 if state[inst.id] != inst.state 21 if state[inst.id] 22 puts "#{inst.id} changed from
19%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
Laboratory Technical Report 536, 2002: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf Becher, M., M. Dornseif, and C.N. Klein. "FireWire: All Your Memory are Belong to Us." A presentation at Can
19%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"RevisionId": "aa63-b5c0-4ec2-a5e99", 11 "MemorySize": 128, 12 "Version": "$LATEST", 13 "Role": "arn:aws:iam::XXXXX:role/bashFunctionRole", 14 "Timeout": 3, 15 "Runtime": "provided", 16
19%
OpenMP – Loops and Data Control
08.05.2019
Home »  HPC  »  Articles  » 
; ia[i] = i;     test(a,b,c, SIZE);       for (i=0; in", a[i], b[i], c[i]); }   Listing 9: nowait Output            0
19%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
: 09 bb:0f:e3:7f:3e:ab:c3:5d:32:78:85:04:a2:da:f1:61 root@host1 You need to distribute the public part, that is the /root/.ssh/id_rsa_cluster.pub file, to all nodes in the cluster. The Strict
19%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
version [9]. Listing 3 /etc/openvpn/ccd/John_Doe 01 # John Doe 02 ifconfig-push 192.168.1.3 255.255.255.0 03 push "topology subnet" 04 push "redirect-gateway" 05 push "dhcp-option DNS 192
19%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7 # # ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs /00
19%
Building a virtual NVMe drive
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © lassedesignen, 123RF
7 1 56008 loop1 06 7 2 56184 loop2 07 7 3 91264 loop3 08 259 0 244198584 nvme0n1 09 8 0 488386584 sda 10 8 1 1024 sda1 11
19%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
existing backups, enter: burp -a l -b a Of course, more complex queries are also possible. For example, burp -a l -b 3 -r lists all of the files in backup 3 that match the "regular
19%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f3c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e6c4e1f

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 73 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice