Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%2222%A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (329)
  • Article (147)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 49 Next »

29%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
server with a compromised MySQL binary. A forensics professional informed me that the following strings belonged to a Trojan: 7A 50 15 00 40 00 67 30 15 02 11 9E 68 2B C2 99 6A 59 F7 F9 8D 30
29%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
. Figure 5: Terminal after creating a new tmux window. To cycle through windows, press Ctrl+B-n (next), Ctrl+B-p (previous), or Ctrl+B-x  (where x =0-9) to go to a specific window. If you type Ctrl
29%
Unicode migration with an Oracle database
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© joingate, 123RF.com
use what are known as national language data types (NCHAR, NVARCHAR2, or NCLOB). Converting the database to Unicode removes this need and the "N" data types can be converted back to "normal" data types
29%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
and password, are added to the database query. This approach works in theory, but imagine an attacker changing the query like this: Password = ' OR 'a' = 'a' The query to the database is now: SELECT * FROM
29%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
. This command connects to the Linux box with an IP address of 10.9.11.32 on port 5555. Now, I can run some commands to see what kind of box I have: hostname – outputs the name of workstation ifconfig --a
29%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
as well as encrypting it, but I like to keep these two steps separate. Listing 2 Compress and Encrypt a File $ gzip -9 hpc_001.html $ ls -s total 11084 11032 Flying_Beyond_the_Stall.pdf 28
29%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
of a command-line tool written in Go. CST carries out all the intended tests and returns a test report when done. The source code is licensed under the Apache 2.0 license and is available from GitHub [1
29%
Working with the Lustre Filesystem
24.02.2022
Home »  HPC  »  Articles  » 
, the RPMs shown in Listing 2 will be listed in the root of the source directory. Listing 2: RPMs After the Build $ ls *.rpm kmod-lustre-client-2.14.56_111_gf8747a8-1.el8.x86_64.rpm kmod
29%
Lustre HPC distributed filesystem
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Efe Kurnaz on Unsplash
shown in Listing 2 will be listed in the source directory's root. Listing 2 RPMs After the Server Build $ ls *.rpm kmod-lustre-client-2.14.56_111_gf8747a8-1.el8.x86_64.rpm kmod
29%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
and password , are added to the database query. This approach works in theory, but imagine an attacker changing the query like this: Password = ' OR 'a' = 'a' The query to the database is now: SELECT * FROM

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 49 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice