Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%3%A9n Llorente 10 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (216)
  • Article (83)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 31 Next »

26%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
south of 200MB on your hard drive, which is surprisingly little in view of the broad feature set. One particular advantage of the tool is that the developers behind this project always look to support
26%
AWS Elastic Beanstalk
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Aleksandra Glustsenko, 123RF.com
]: y remote: remote: error: Unable to deploy application version: No Environment found for EnvironmentName = 'DanApp-env'. remote: To https://AKIAJ2XDUJ2NAFXXXXXXXX: XXXXXXa9a9fe7e0fd7XXXXXXXXa94d
26%
Netcat – The Admin’s Best Friend
20.08.2012
Home »  Articles  » 
 
the port after the file transfer has completed (but not without moving to the netcat-traditional package, as mentioned before): { echo -ne "HTTP/1.0 200 OK\r\n\r\n"; cat filename.tar.gz; } | nc -l -p 15000
26%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
): { echo -ne "HTTP/1.0 200 OK\r\n\r\n"; \ cat filename.tar.gz; } | nc -l -p 15000 Be warned that this might not work for you, but with some trial and error, to enable some extra interaction, you could try
26%
News for Admins
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
 
://security.apple.com/blog/imessage-pq3/), PQ3 is "a groundbreaking post-quantum cryptographic protocol that advances the state of the art of end-to-end secure messaging." Apple says PQ3 is the first messaging protocol to reach what ... In the news: CIQ Offers Long-Term Support for Rocky Linux on AWS; Apple's PQ3 Brings Post-Quantum Security to iMessage; Google Open Sources Magika File-Type Detection System; Microsoft Announces Sudo
26%
StarCluster Toolkit: Virtualization Meets HPC
16.01.2013
Home »  HPC  »  Articles  » 
-east-1d Keypair: foocluster EBS volumes:     vol-4c048437 on master:/dev/sda (status: attached)     vol-4f048434 on node001:/dev/sda (status: attached) Cluster nodes:     master running i-6a10c710 ec2
26%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
of an uncorrectable error by factors of 9-400. Uncorrectable errors following a correctable error are still small at 0.1%-2.3% per year. + The incidence of correctable errors increases with age
26%
SMART Devices
14.08.2020
Home »  HPC  »  Articles  » 
 is:        In smartctl database [for details use: -P show] ATA Version is:   ACS-2, ATA8-ACS T13/1699-D revision 4c SATA Version is:  SATA 3.1, 6.0 Gb/s (current: 6.0 Gb/s) Local Time is:    Sun Aug  2 10:41:21 2020 EDT SMART
26%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
. Figure 6: Good old ``get pods'' but with width: ``kubectl get pod nginx-dep-54b9c79874-b9dzh -o wide'' showing an internal pod IP Address in the 172.17.0.0 range. Use the -n option to specify
26%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... recipient versus people who get access that information and try to break the encryption (decrypt it). There are literally hundreds of books on the subject (a quick Amazon search turned up 3,998 results ... The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice