Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%2000 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (168)
  • Article (42)
  • News (12)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next »

25%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
I don’t know if I’ll ever be as famous as Steve Jobs, but if you ask me how to perform just about any repetitive administrative task, I’ll tell you, “There’s a script for that,” and its corollary is
25%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
Windows administrators: Expand your horizons and your opportunities with Unix commands via Cygwin. Use Cygwin’s extensive list of Unix utilities for scripts, maintenance, compatibility ... PowerShell\v1.0\;C:\Program Files (x86)\Common Files\Citrix\System32\ To use Cygwin effectively, you need to add E:\Cygwin\bin to your PATH environment variable. Of course, use the location of your installation’s ... Windows administrators: Expand your horizons and your opportunities with Unix commands via Cygwin. Use Cygwin’s extensive list of Unix utilities for scripts, maintenance, compatibility
25%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
What’s new at the 2024 International Supercomputing Conference and in the TOP500. ... Tweets around ISC 24 is from Jeff Hammond, speaking about rewriting code for GPUs: Hammond’s law: almost no one will rewrite their code for less than 2x and almost everyone will rewrite their code ... What’s new at the 2024 International Supercomputing Conference and in the TOP500.
25%
Setting up FreeNAS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Franck, 123RF.com
NAS Features" box for details). FreeNAS Features Runs on commodity 64-bit hardware Cross-platform file sharing support for Windows, OS X, Linux, and Unix, with support for CIFS, AFP, NFS, i ... 25
25%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
): 11 12 s = 0.0 13 s += h * f(a) 14 for i in range(1, n): 15 s += 2.0 * h * f(a + i*h) 16 # end for 17 s += h * f(b) 18 return (s/2.) 19 # end def 20 21 22 # Main section 23 comm = MPI
25%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
are synchronized. For example, for a new sales campaign, you can easily add staff from one campaign who are already members of a team as members of the new team: Get-AzureADGroupMember -ObjectId e45712da-4a52-422c
25%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
:aws:iam:::policy/IAM_Policy --policy-document file://privesc.json --set-as-default { "PolicyVersion": { "VersionId": "v2", "IsDefaultVersion": true, "CreateDate": "2021-10-14T09:52:55+00:00" } } By checking the policy
25%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
runs on 64-bit operating systems, requiring systemd along with KVM and Qemu version 5.2 or newer for virtualization. It needs at least 4GB of RAM, and the developers recommend KDE Plasma, Gnome, or Mate
25%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
and system owners, which makes it easy to provide protection against exploits. Brute force attacks on SSH servers, the lack of encryption in communications, and distributed denial of service (DDoS
25%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
random MAC addresses and sends them out to the interface. Listing 1 Generating random MAC addresses root@kali:~# macof -e eth1 e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice