Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (183)
  • Article (81)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 27 Next »

29%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
lacks support for SSH access and access to the hard disks' S.M.A.R.T data. Thecus N6850 We imported the Thecus N6850 from its vendor in the Far East, but you can buy it directly from dealers. What you
29%
Free Enterprise Backup with Bareos
12.11.2013
Home »  Articles  » 
they are addressed Which files should be backed up (a FileSet) The plugin configuration The before and after jobs (i.e., programs that are started before or after a backup job, e.g., to start and stop
29%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
. The pwgen command generates a password and encrypts with sh256sum: pwgen -N 1 -s 100 echo -n | sha256sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
29%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
://127.0.0.1/dvwa/ vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="PHPSESSID=ce0aa7922720f3190bf9bbff7f24c434;security=low" --forms After a short while, SQLmap finds the matching ID field and asks
29%
Stretching devices with limited resources
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Lucy Baldwin, 123RF.com
] device to store /var/log, offloading the primary source of boot-time writes from the physical device to a 50MB RAM drive. Figure 3: Three zram partitions
29%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
root:root /usr/local/bin/dockerize FROM google/cloud-sdk:alpine SHELL ["/bin/ash", "-o", "pipefail", "-c"] RUN apk add --no-cache --virtual .build-deps alpine-sdk libffi-dev openssl-dev python3-dev py3
29%
Nmon: All-Purpose Admin Tool
17.12.2014
Home »  HPC  »  Articles  » 
) option and the CPU stats (c ) option while running the FT benchmark. Figure 3: Long-term CPU stats while running NPB FT benchmark. To create
29%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
Interactive HPC applications written in languages such as Python play a very important part today in high-performance computing. We look at how to run Python and Jupyter notebooks on a Warewulf 4 ... of packages in the file req.txt in the home directory of the anaconda user that can be used to create the shared_env environment: $ /opt/apps/anaconda3/bin/conda create -n shared_env --file ./req
29%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
-RTT poses a threat to any application that runs in multiple zones but declines tickets issued in one zone (A) in any other of its zones (B, C, D, …). By sending a ClientHello and early data intended ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way. ... TLS 1.3 ... TLS 1.3 and the return of common sense
29%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
, and physical memory (32- and 64-bit windows). dc3dd [2] – a tool that captures the content of memory on the infected system; dc3dd is basically the standard *nix dd utility upgraded for forensic use, which

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice