Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (262)
  • Article (79)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 38 Next »

6%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
of unauthorized queries, GreenSQL returns an empty result set, closes the connection to the database, or returns an error message. GreenSQL as an IDS GreenSQL can operate in combination with a risk profile
6%
Managing the Build Environment with Environment Modules
06.11.2012
Home »  HPC  »  Articles  » 
.2.9/ default The easiest way to initialize Modules is to use the standard /etc/profile.d mechanism. This can be done by copying the following initialization files to /etc/profile.d . For instance, copy
6%
Microsoft System Center Virtual Machine Manager 2008 R2
14.07.2011
Home »  CloudAge  »  Articles  » 
 
and Templates The library component in SCVMM is simply a shared directory where virtual hard disks (VHD files), ISO images, hardware, and guest operating system profiles are stored. You can use templates
6%
Tuning Ansible
09.05.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
to callback_whitelist = timer, mail, profile_tasks which involved uncommenting the line, making sure timer existed as a callback plugin, and loading the profile_tasks plugin. When I executed my playbooks
6%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
in combination with a risk profile as an IDS or IPS. The queries themselves do not determine whether a request is allowed but, instead, result in an action taken. Depending on the configuration, the IDS blocks
6%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
Permissions Action Result CreateAccessKey Any user with this permission could abuse it to create a new access key to another IAM admin account. CreateLoginProfile
6%
StarCluster Toolkit: Virtualization Meets HPC
16.01.2013
Home »  HPC  »  Articles  » 
/yum.conf # . /etc/profile.d/modules.sh # module load openmpi-x86_64 # ompi_info | grep -i grid   MCA ras: gridengine (MCA v2.0, API v2.0, Component v1.5.4) # echo "module load openmpi-x86_64" >> /etc/profile
6%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
structures automatically, which means you do not need to rely on generating a kernel profile up front. However, with some memory dumps, automatic detection is not reliable. In this case, Volatilitux provides
6%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
Configuration\Policies\Administrative Templates\Network\Network Connections\Windows Firewall\Domain Profile . RDP Files for Quick Access In addition to various additional tools for establishing RDP connections
6%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
is important because it includes where things like MPI libraries or profilers are located, as well as where compilers and their associated tools are located. I discuss these concerns as the article progresses

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice