Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 ... 186 Next »

13%
SSH on Windows
17.09.2013
Home »  Articles  » 
-keygen -t rsa (optionally, ssh-keygen -t dsa ) to generate a new RSA or DSA key pair of public and private keys (Figure 3). Figure 3: Generating a RSA key
13%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
, or simulated by the honeypot. The set of services visible to the attacker on the target system is equal to the total set of the services offered by the server and the analysis system (Figures 3 and 4
13%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
agent. This agent basically consists of an input mask (Figure 3). Each desktop environment can supply its own authentication agent. Figure 3
13%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
development for several years. In early 2013, the developers from the Institute of Compute Technology (ICT) at the Chinese Academy of Sciences will present the latest development called the Godson-3B
13%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
server (hosting) Resolving DNS server (caching) API to provision zones and records DNSSEC support (as of 3.x) Web-based management options DNS data stored in plaintext (BIND compatible
13%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
: pdsh -w host[1-11] pdsh -w host[1-4,8-11] In the first case, pdsh expands the host range to host1, host2, host3, …, host11. In the second case, it expands the hosts similarly (host1, host2, host3, host
13%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
), and -t specifies the target directory to download the files. Now open up a web browser and look at the results of the warnerbros.html file (see Figure 3
13%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
pointed out as early as 2009 a lack of publications on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this
13%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
example illustrating the change in file size: $ ls -lsah FS_scan.csv  3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv $ gzip -9 FS_scan.csv  $ ls -lsah FS_scan.csv.gz  268K
13%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
is installed by default on my Ubuntu 20.04 systems. Listing 1: logrotate $ logrotate --version logrotate 3.14.0       Default mail command:       /usr/bin/mail     Default

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice