Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 Next »

23%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
information about current authentications and authorizations at short intervals (Figure 4). This feature has proven to be very useful in practice, and the statistics provide a good starting point in the event
23%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
by replacing the values in the file operations structure with pointers to inserted malicious code (Figure 4). In this example, an attacker might replace the pointer to the file's delete operation that can
23%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
1.4.5. Libgpg-error library (optional but required for hashing support). Note that you must configure with --enable-static to ensure that the static version of this library exists. Tested
23%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
, selective, and sophisticated. In native reflexive DNS attacks, the reply packets are significantly larger than the request packets. The amplification factor here is only 3 or 4. A selective, reflexive DNS
23%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
262652 654 ...88.10 2752 chrome 138 27 37056 12492 572 8,534.05 732 pcmontask 329 17 8744 14484 86 4,442.07 5992 WmiPrvSE 730 35 130680
23%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
/Linux\r Ubuntu 10.04.4 LTS\r \r Welcome to the Ubuntu Server!\r * Documentation: http://www.ubuntu.com/server/doc\r \r System information as of Thu Oct 11 15:55:28 CDT 2012\r \r System load: 1
23%
DBaaS: EnterpriseDB – PostgreSQL in the Cloud
20.08.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
to work. Just work. Straightaway. The barriers haven’t disappeared, but if you’re frustrated with something that you spent four years of your budget on and is using up 4Us of space, you’ll think twice
23%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
to the end of the URL after the slash so rather than bit.ly/R4c6feh , you could instead use bit.ly/dictionaryword . Another feature some services offer is the ability to edit the destination URL at a later
23%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
been used to provision and manage some of the biggest supercomputers in the world. At present I am working on the architecture for the next major version of Warewulf (v4). I am also part of a new open
23%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
of keywords, and access to error messages. Procedure pointers. Support for IEEE floating-point arithmetic and floating-point exception handling. Support for international usage: access to ISO 10646 4

« Previous 1 ... 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice