Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1345)
  • Article (336)
  • News (251)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 194 Next »

9%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
a step in the right direction. Authentication policies can, to a certain extent, help limit the attack surface for brute force. For example, a Tier 0 account cannot be blocked by a brute-force attack
9%
PC over IP
03.09.2013
Home »  Articles  » 
 
and easily with the ping scan method (-sP ; Listing 1). Listing 1: IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0.190) Nmap
9%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
an integer argument, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments
9%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
machine or flood a network). Even from the default view, with iftop -i eth0 where -i declares which interface you want to monitor, you can simply press the f key to enter one of the many filters
9%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments, like its Python
9%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
are certainly justifiable: Disable the unencrypted connection and enable the SSL-protected web server by adding the following lines to the /etc/ntopng/ntopng.conf file, --http-port=0 --https-port=443
9%
System Center 2012 SP1: What's new?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
snvv, 123RF
availability on request. In this way, all virtual servers can be centrally managed, whether they run locally or in the cloud. SCVMM SP1 or newer supports the new VHDX disks in Hyper-V 3.0 and Windows Server
9%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
-based interface that lets you adjust extensive settings. Listing 1 IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0
9%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
9%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
/log/time.log --size 0; done"] EOF The deployment has deliberately been kept simple. In the shell, it just writes the current date to a logfile at regular intervals. Now, you can start writing a Blueprint. In many

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 194 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice