Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1294)
  • Article (303)
  • News (162)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 142 143 144 145 146 147 148 149 150 151 152 153 154 155 ... 177 Next »

9%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
(e.g., which you can use to read passwords in the scope of a pentest) are available for download from GitHub [5] [6]. Flipper Zero is designed for interaction with a smartphone. During the initial
9%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
of the infrastructure. For a first impression or in a small environment, Wazuh provides a virtual machine [6] that contains all services and appears at https:// after booting. Without agents, though
9%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
(Figure 6). Figure 6: Registered attacks on various ports of production systems at the University of Bonn courtesy of HoneypotMe. All told, some 3
9%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
and change to the Remote Macros tab. There, you can press a button to add a new command, type the command in the Command line, and even add an intuitive name (Figure 6
9%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
lines that are added to the emails. You should also insert the headers recommended in the corresponding RFC (Listing 6). These headers set Reply-To to the list address, provide a contact address for error
9%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
(language), whether this is a reseller account (if this account can create other accounts), and so on. One rather interesting choice you need to make is the package you are selling your client (see Figure 6
9%
Container compliance with dockle
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
snippets for the Amazon Elastic Container Registry (AWS ECR), the Google Cloud Platform Container Registry (GCP GCR), and self-hosted registries (and how to toggle SSL on and off). In Listing 6 you can see
9%
Cluster Documentation Project
08.05.2012
Home »  HPC  »  Articles  » 
HPC market was estimated to be US$ 25.6 billion (Source: Intersect360) with a healthy annual growth rate. At the core of this market are Linux clusters, which can range from desk-side to systems
9%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
’s how I see what we’re doing with ROCm. We planted a flag, and now it’s an evolution. Resources [1] ROCm [2] ROCm – A New Era in Open GPU Computing [3] ROCm documentation [4] ROCm video [5] HIP [6
9%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
. My Warewulf 4 cluster currently runs Rocky 8.6 (soon to be 8.7). A container used for the stateless compute nodes is the same as the head node (Rocky 8.6). Both /home  and /opt  are NFS shared from

« Previous 1 ... 142 143 144 145 146 147 148 149 150 151 152 153 154 155 ... 177 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice