Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (261)
  • News (7)
  • Article (4)
Keywords

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 28 Next »

18%
The Resurrection of bWatch
02.06.2025
Home »  Articles  » 
Photo by NASA Hubble Space Telescope on Unsplash
found that the list of nodes (hosts) is specified in a file named .bWatchrc.tcl  in the root directory: set listOfHosts {node1 node2 node3 node4 node5 node6 node7 node8} I’m not sure what restrictions
18%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
demanding in terms of resource requirements. In addition to a Python interpreter (version 2.6 or greater), you need to install the pcapy-ng package. If you use Python 3.x, this will be pcapy instead. You
18%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
with lots of information (see Figure 6). The scraper script pulls down registry and system information: meterpreter > run winenum meterpreter > run scraper
18%
Virtual switching with Open vSwitch
30.11.2025
Home »  CloudAge  »  Articles  » 
rustycarr, 123RF
-devel, or something similar. After the build, you should check the installation and launch the software for the first time. To do so, you can load the kernel module manually: modprobe datapath/linux-2.6/openvswitch
18%
Remote Desktop with UltraVNC
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anthony DOUANN, 123RF
-protected login (in the Security tab) or to enable MS Logon . If you intend to use the DSM plugin, you need to cancel at this point, then download the DSM plugin [6] for AES, MSRC4, or ARC4 encryption, unpack
18%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
and may warrant further manual auditing. I know Coverity has been used on the Linux kernel before (prompting Linus Torvalds' often-mocked announcement with the release of the 2.6.11 kernel that "it's now
18%
Manage your servers with System Center Essentials
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kheng Ho Toh, 123RF.com
on the computer, and the computer's current load (Figure 6). Figure 6: SCE showing errors on servers in a centralized interface. Of course, you can use
18%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
the server certificate. 5. The client sends the encrypted SSL session key to the server. 6. The server decrypts the client's SSL session key using its own private key and encrypts the communications
18%
Operating large language models in-house
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Conner Baker on Unsplash
series, which were originally developed for gaming and professional visualization but are also suitable for AI because of their good compute power and CUDA compatibility. With 24GB of GDDR6X memory and up
18%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
it with the & character): for i in $(seq 1 6); do spark-submit --master k8s://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice