Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 67 Next »

8%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
.private.enterprises.netSNmp.netSnmpObjects.nsExtensions.2.1.0 = INTEGER: 1 .iso.org.dod.internet.private.enterprises.netSNmp.netSnmpObjects.nsExtensions.2.2.1.2.7.114.112.105.116.101.109.112 = STRING: "/bin/cat" .iso.org.dod.internet
8%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
attacks but also by internal flaws that can cause significant problems. Linux offers an almost endless variety of tools for performing tests and simulated attacks to help protect a network. However
8%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
. Since then, this value dropped by around 50 percent to about 8.5W/HDD in 2015 and is currently about 4.3-5.0W for a 16-18TB HDD. Greater energy efficiency means that more power is available for the energy
8%
Credential management with HashiCorp Vault
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
with the following command $ vault write ssh/roles/ec2instance key_type=otp default_user=ec2-user > cidr_list=w.x.y.z/32 which sets the key type to otp and the user to the default ec2-user. You can randomly adapt
8%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
168 (gdb) p j $3 = 144 (gdb) c Breakpoint 2, Calc_vacf () at MD.o.c:671 671 vacf[j-i]=0; (gdb) p &j $6 = (int *) 0xffffc168 (gdb) p j $7 = 144 On the other hand, when dealing with the ELF
8%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
of 11 hours) and cost US$ 4,362. This is $0.4115 per instance for 11 hours, or $0.037 per instance per hour. For the researcher that needs to run 25,000 instances at the same time, on the basis of Cycle’s ... The Cloud’s Role in HPC
8%
BlackHat USA 2010
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
. In the case of SSL certificates, they scanned the Internet and found 1.2 million SSL-enabled websites [3] [4]. Among the problems found were certificates for reserved addresses (e.g., 192.168.1.2, a reserved IP
8%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
frequency – the reader and tags must transmit in the same frequency range to work together successfully. Candidate 1 is low-frequency systems that operate at between 120 and 140KHz. Product or card family 2
8%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
is ideal when automation needs to be fast, flexible, and free from direct user interaction. It works on the basis of APIs and connects effortlessly to servers and software as a service (SaaS) services ... We provide an overview of the features, fields of application, and pricing of Microsoft Power Automate, highlighting the pros and cons of the SaaS platform for optimizing and automating workflows
8%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
GSvEFc/" date = "2016-01-03" hash = "b90f268b5e7f70af1687d9825c09df15908ad3a6978b328dc88f96143a64af0f" strings: $s0 = "WshShell.Run \"dropbear.exe -r rsa -d dss -a -p 6789\", 0, false" fullword ascii

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice