Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 171 Next »

23%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
Strobel [4], head of the security consultancy cirosec, pointed out that the basis of ASM is a vulnerability scanner (i.e., established technology). According to Strobel, though, ASM also covers companies
23%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
ransomware has made it into an organization, it spreads with PsExec and a batch file distributed by the admin share. This Windows NT4 technology is still commonplace today and many administrators use
23%
A self-hosted server and site manager for WordPress
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Marek Ulliasz, 123RF.com
and then follow the extensive instructions online [4]. For the purposes of this article, I'll be using the DigitalOcean image because it's the fastest way to get up and running. If this is the first time you
23%
Web Cryptography API
26.11.2013
Home »  Articles  » 
RawKey = "4ea1...b2bf"; 02 var encAlg = { 03 name : "AES-GCM", 04 params : { 05 iv : hex2bin("534aea17"), 06 additionalData: hex2bin("534aea17"), 07 tagLength: 128 08 } 09 }; 10 function encrypt
23%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
to set up a temporary wait state to receive a response from the remote host. The first step (Listing 1) is to set up your connect string (line 4). If you connect to multiple hosts using a loop, you could
23%
Network Grep
26.11.2012
Home »  Articles  » 
 
it will listen for both IPv4 and IPv6 traffic on port 23 for Telnet. The match is the pattern for which ngrep is searching. The -w switch tells ngrep to match the regular expression (login , in this case
23%
Living with Many and Multiple Cores
04.12.2012
Home »  HPC  »  Articles  » 
these designs. The increase in frequency or “megahertz march,” as it was called, started to create problems when processors approached 4GHz (109Hz, or cycles per second). In simple terms, processors were getting
23%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
. The speed-up increases from 1.00 with 1 process to 4.71 with 64 processes. However, also notice that the wall clock time for the serial portion of the application does not change. It stays at 200 seconds
23%
SGI Interview: SGI VP Bill Mannel talks about Altix ICE
12.11.2011
Home »  HPC  »  Vendors  »  SGI  » 
 
processing capability. So, typically, you want – it varies obviously – but you want 4 to 8 drives per node in a Hadoop cluster, and that’s typically not something you would do on an Altix ICE type of system
23%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
(2000, XP, Vista, 7, and Server 2008) and for Linux (CentOS, Debian, Oracle, SUSE). You can handle the setup at the command line on the host system, which turns out to be a Red Hat 4.1.2-based Cent

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice