Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12!600 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (116)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 60 Next »

10%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
4 Low drop AF11 = 10 (001010) AF21 = 18 (010010) AF31 = 26 (011010) AF41 = 34 (100010) Medium drop AF12 = 12 (001100) AF22 = 20 (010100
10%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
in TLSv1.0 was error-prone, but the problems long remained theoretical. TLSv1.1, which was designed to iron out the worst weaknesses of CBC, followed in 2006. Two years later, TLSv1.2 was released
10%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(text) { 11 polycrypt.importKey("raw", hex2bin(encRawKey)).oncomplete = function(e) { 12 var key = e.target.result; 13 polycrypt.encrypt(encAlg, key, str2bin(text)).oncomplete = function(e) { 14 var
10%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
= sol.copy() 10 11 for j in range(0,ny-1): 12 sol[0,j] = 10.0 13 sol[nx-1,j] = 1.0 14 # end for 15 16 for i in range(0,nx-1): 17 sol[i,0] = 0.0 18 sol[i,ny-1] = 0.0 19 # end for 20 21 # Iterate 22
10%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
= [size][size]int {{0},{0},} 08 09 for i := 0; i < size; i++ { 10 for j := 0; j < size; j++ { 11 array[i][j]++ 12 } 13 } 14 15
10%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
#auto eth0 06 #iface eth0 inet dhcp 07 auto br0 08 iface br0 inet dhcp 09 bridge_ports eth0 10 bridge_stp off 11 bridge_maxwait 5 12 post-up /usr/sbin/brctl setfd br0 0 Next, create a directory
10%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
10%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
DiskSizeGB: 47 10 } 11 source: { 12 type: 'PlatformImage' 13 offer: 'windows-ent-cpc' 14 publisher: 'MicrosoftWindowsDesktop' 15 sku: 'win11-22h2-ent-cpc-m365' 16 version
10%
Preload Trick
11.05.2021
Home »  HPC  »  Articles  » 
,024 0.100395 21.390301 0.215065 9.985277 0.02961 72.526405 0.055252 38.867022 2,048 0.776039 22.137891 1.612694 10
10%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
check_interval 5 12 retry_interval 1 13 contacts spz_admin 14 notification_period 24x7 15

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice