Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (129)
  • Article (73)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 Next »

23%
Linux apps on Windows 10 and Chrome OS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Cornelius, Fotolia.com
. Figure 1: Microsoft is working on its own GUI solution that translates Wayland and X11 apps to RDP [3]. © devblogs.microsoft.com Even without installing an Insider version, you do not have to do
23%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
:aws:iam:::policy/IAM_Policy --policy-document file://privesc.json --set-as-default { "PolicyVersion": { "VersionId": "v2", "IsDefaultVersion": true, "CreateDate": "2021-10-14T09:52:55+00:00" } } By checking the policy
23%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
of Metasploit's capabilities, just click on the Armitage entry in the main menu in Parrot or Kali Linux. Tutorials Point [7] and Offensive Security [8] offer good beginner tutorials for point-and-click forensics
23%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
 convolutionSum = 0.0f; 05  06     // Iterate over convolution kernel 07     for(size_t ky = 0; ky < kernel.height; ++ky) 08     { 09       for(size_t kx = 0; kx < kernel.width; ++kx) 10  11       { 12
23%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
.1) are basically based on the idea of the original HTTP protocol (HTTP/0.9), which assumes that a web browser establishes a dedicated TCP connection to the web server for each request (i.e., for an HTML file
22%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14 virtual webs.test.com { 15 active = 1 16
22%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
over continents, caused them headaches. They created a tool called Akkio that always tries to store the data in the geographical vicinity of the requester, which proved possible for around 80 percent
22%
Web Cryptography API
26.11.2013
Home »  Articles  » 
: "RSASSA-PKCS1-v1_5", 03 params: { 04 modulusLength: 512, 05 publicExponent: new Uint8Array([0x01, 0x00, 0x01]) 06 } 07 }; 08 var sigAlg = { 09 name: "RSASSA-PKCS1-v1_5", 10 params: { hash: "SHA-1
22%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
payment = new Payment(orderId,**1000.00d); 07 final ProducerRecord record = 08 new ProducerRecord("transactions", 09 payment
22%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
| elapsed: 0.0s remaining: 4.5s [Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s [Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice