Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 201 Next »

17%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
about SELinux violations end up in the /var/log/audit/audit.log file. However, other types of log messages end up there as well. Listing 4 shows a useful idiom for pulling out just the SELinux
17%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
Manager (NTLM) and Kerberos RC4. The reason lies with the migration of NT domains to AD, the negative effects of which (e.g., the overpass-the-hash attack) are serious. On the architecture side, you
17%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
1.4.5. Libgpg-error library (optional but required for hashing support). Note that you must configure with --enable-static to ensure that the static version of this library exists. Tested
17%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
, selective, and sophisticated. In native reflexive DNS attacks, the reply packets are significantly larger than the request packets. The amplification factor here is only 3 or 4. A selective, reflexive DNS
17%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
262652 654 ...88.10 2752 chrome 138 27 37056 12492 572 8,534.05 732 pcmontask 329 17 8744 14484 86 4,442.07 5992 WmiPrvSE 730 35 130680
17%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
/Linux\r Ubuntu 10.04.4 LTS\r \r Welcome to the Ubuntu Server!\r * Documentation: http://www.ubuntu.com/server/doc\r \r System information as of Thu Oct 11 15:55:28 CDT 2012\r \r System load: 1
17%
DBaaS: EnterpriseDB – PostgreSQL in the Cloud
20.08.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
to work. Just work. Straightaway. The barriers haven’t disappeared, but if you’re frustrated with something that you spent four years of your budget on and is using up 4Us of space, you’ll think twice
17%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
to the end of the URL after the slash so rather than bit.ly/R4c6feh , you could instead use bit.ly/dictionaryword . Another feature some services offer is the ability to edit the destination URL at a later
17%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
been used to provision and manage some of the biggest supercomputers in the world. At present I am working on the architecture for the next major version of Warewulf (v4). I am also part of a new open
17%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
of keywords, and access to error messages. Procedure pointers. Support for IEEE floating-point arithmetic and floating-point exception handling. Support for international usage: access to ISO 10646 4

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice