Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (318)
  • Article (111)
  • News (17)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 45 Next »

18%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware
18%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
-o pe_start # vgcreate RaidVolGroup00 /dev/sdx # lvcreate --extents 100%VG --name RaidLogVol00 RaidVolGroup00 # mkfs -t ext3 -E stride=32 -m 0 -O dir_index,filetype,has_journal,sparse_super /dev
18%
GitLab Survey Reflects Shifting Roles in DevSecOps
29.08.2022
Home »  News  » 
 
.” 52% manage cloud services “all or most of the time,” and 31% manage cloud services “sometimes.” A majority of respondents also reported spending between one quarter to half of their time managing
18%
Demand for Tech Talent Remains High
28.11.2022
Home »  News  » 
 
Despite industry layoffs, economic challenges, and reported hiring freezes, demand for tech talent remains high, according to a recent survey from Dice, “with more than 3.8 million tech jobs posted
18%
Delphix Report Cites Growing Concerns Over Data Protection
21.08.2024
Home »  News  » 
 
-production environments, while 53% reported data corruption and alteration, and 52% cited audit issues and failures. Read more at Delphix.            
18%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
.pool.ntp.org driftfile /var/lib/chrony/drift makestep 1.0 3 rtcsync allow 10.0.0.0/8 local stratum 10 keyfile /etc/chrony.keys leapsectz right/UTC logdir /var/log/chrony I pointed the head node to 2.rocky
18%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
, and there are several implementations [3]. What Happened Thus Far Figure 1 shows a typical setup with port knocking. The components involved here are the client and the server application, with a firewall to keep out
18%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
modified mine to keep it really simple: server 2.rocky.pool.ntp.org driftfile /var/lib/chrony/drift makestep 1.0 3 rtcsync allow 10.0.0.0/8 local stratum 10 keyfile /etc/chrony.keys leapsectz
18%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
to show seconds and microseconds since the beginning of the Unix epoch (00:00:00 UTC on January 1, 1970) (Figure 3). Figure 3: Reporting time since
18%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
application then grabs the data from this database and creates charts. The client can be programmed by the user or it can come as a prepared daemon (e.g., collectd [3]). If you like to measure your own

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 45 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice