Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (387)
  • Article (143)
  • News (6)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 54 Next »

20%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
sounds very much like open source, Nessus became a proprietary product by Tenable Network Security 10 years ago. Up to version 3.0, the product was released under the GPL, but this stopped in October 2005 ... To ensure your servers and workstations are well protected against attacks on your network, you need a professional security scanner. In version 6, Tenable has substantially expanded its Nessus ... Tenable Nessus v6 ... Tested – Tenable Nessus v6
20%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
workstation. A converter [6] can be used, but its use is a little quirky. Option 3, which I employ here, is to use a prebuilt appliance. VMware offers various prebuilt virtual machines [7] on the Solution
20%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
 -rw-r--r-- 1 laytonjb laytonjb 261K 2014-06-09 20:31 FS_scan.csv.gz The original file is 3.2MB, but after using gzip with the -9 option (i.e., maximum compression), the resulting file is 268KB. The .gz
20%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
, and physical memory (32- and 64-bit windows). dc3dd [2] – a tool that captures the content of memory on the infected system; dc3dd is basically the standard *nix dd utility upgraded for forensic use, which
20%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
6105) [3] and DHCPv6-Shield [4]. These functions are implemented on switches and referred to as First Hop Security. SEND (Secure Neighbor Discovery) [5] is an approach that relies on cryptographically ... Even though corporations are looking to move to IPv6, in some situations networks still rely exclusively on IPv4. We discuss ways to minimize delays and unsatisfactory behavior in mixed IPv4/IPv6 ... IPv6 on IPv4 Security ... IPv6 security on IPv4-only networks
20%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
@trapper:~\$ " send -- "ssh aspen\r" expect -exact "ssh aspen\r khess@aspen’s password: " send -- "PASSWORD\r" expect -exact "\r Linux aspen 2.6.32-43-server #97-Ubuntu SMP Wed Sep 5 16:56:41 UTC 2012 x86_64 GNU
19%
StarCluster Toolkit: Virtualization Meets HPC
16.01.2013
Home »  HPC  »  Articles  » 
instances of 64-bit Scientific Linux 6. Use the text editor of your choice to add the lines in Listing 3 to your ~/.starcluster/config file. Listing 3: Adding Config Settings $ nano ~/.starcluster
19%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
5221548db 58 seconds ago 5.67MB 80dc7d447a48 About a minute ago 167MB alpine 3.9 78a2ce922f86 5 months ago 5.55MB The command you really
19%
Zero-Ops Kubernetes with MicroK8s
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Among the number of burgeoning Kubernetes distributions available today is the excellent production-ready K3s [1], which squeezes into a tiny footprint and is suitable for Internet of Things (Io ... A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM.
19%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
0.499MiB of data (the code would round this down to one decimal place, or 0.0). Figure 6: Analysis highlights from the darshan-job-summary.pl output

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice