Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (585)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 68 Next »

8%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
What’s new at the 2024 International Supercomputing Conference and in the TOP500. ... operations per second) using the high-performance Linpack (HPL) benchmark. However, this was not the case. It came in at number 2 on the TOP500 list, sending people to Twitter/X and other social media ... What’s new at the 2024 International Supercomputing Conference and in the TOP500.
8%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © 123RF.com
Press website and make it deliver optimally with the use of Amazon CloudFront [1] and a potent plugin, W3 Total Cache [2]. How your site performs can help or hinder your success online, whether you have a simple
8%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
1) 01 #!/usr/bin/expect 02 03 set h [lindex $argv 0] 04 spawn /usr/bin/scp -i /home/aefrisch/.ec2/AEF.pem /home/aefrisch/.ssh/id_rsa.pub ec2-user@${h}: 06 expect "(yes/no)? " 07 send "yes\r" 08
8%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
something like: $ cat cloudnativesecurity.cc -----BEGIN CERTIFICATE----- MIIF1zCCBL+gAwIBAgIRAK7AdUDa5C4Y1o6SSOX4aC0wDQYJKoZIhvcNAQEL ... Step 3 Now that you have the certificate you want to trust saved
8%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
A penetration tester simulates an attack on a customer’s network by trying to find a way inside. Many such attacks begin using a scanning tool, such as NeXpose, Nessus, or Nmap, to look for network
8%
Countering embedded malware attacks
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Daniela Mangiuca, 123RF.com
, the attacker simply renamed the file name extension to DOC to simulate a common file type that is usually opened by unsuspecting users without any concerns. Unfortunately, MHT and DOC files use the same icon
8%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
problems on Open Systems Interconnection (OSI) model Layer 2 or 3 is almost trivial compared with VoIP analysis. In Internet telephony, the sources of error migrate to higher OSI Layers 4 through 7. Vo
8%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
Spanning Tree (IEEE 802.1w), or Multiple Spanning Tree (IEEE 802.1s). All three have the advantage of ensuring loop-free operation. Layer 2 loops overload the switches and can be complex to troubleshoot
8%
Power Talk
01.10.2011
Home »  Articles  » 
 
have spent extensive time in development, simulation, and modeling to ensure a robust platform. Our partners have been working with various levels of silicon over the past six or more months. Beginning
8%
Interview: AMD’s John Fruehe, Director of Server Product Marketing
04.11.2011
Home »  HPC  »  Articles  » 
John Fruehe, AMD’s Director of Product Marketing for the server and embedded space, gives you an inside look at what’s coming with Bulldozer and what it means for HPC vendors and customers. ... tweaked and adjusted with changing conditions? JF: In most cases, this is set at the beginning and not tweaked. Let’s say that you have 8,000 watts of power budget available for the rack and your servers ... AMD is poised to announce a new generation of processors, including the Bulldozer series, which is targeted for data centers and HPC implementations. We asked John Fruehe, AMD’s Director of Product ... Interview: AMD’s John Fruehe, Director of Server Product Marketing ... Interview: AMD’s John Fruehe, Director of Server Product Marketing

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice