Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente 10 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (164)
  • Article (71)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 Next »

26%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
7db9d1663fc695ec2fe2a2c4538aabf651fd0f" 2016-07-25 5:37:00 PM,335 [lib.cuckoo.core.scheduler] INFO: Task #6: acquired machine fed01 (label=fed01) 2016-07-25 17:37:00,345 [modules
26%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
the same version on CentOS 6.x. Figure 8: Gedit 2.30 on Windows 10. The current version 3.20 (Figure 9) of gedit has a new, cleaner interface that works
26%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
push remote.repository.com:5000/alpine:latest The push refers to repository [remote.repository.com:5000/alpine] 73046094a9b8: Pushed latest: digest: sha256:0873c923e00e0fd2ba78041bfb64a105e1ecb7678916d1f
26%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
. Listing 3 YAML Installer File PackageIdentifier: OSC.Ficl PackageVersion: 1.2.0 InstallerLocale: en-US InstallerType: msi ProductCode: '{116A96E1-3C5C-4147-AC63-98427DFE866B}' Installers
26%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
risks, quantifying possible data loss and responding to attacks. Apache Spot [3] uses big data and modern ML components to improve the detection and analysis of security problems. Apache Spot 1.0 has been
26%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
/state/log" 05 dumpuser "amanda" 06 labelstr "MyData[0-9][0-9]" 07 autolabel "MyData%%" EMPTY VOLUME_ERROR 08 tpchanger "chg-disk:/amanda/vtapes" 09 tapecycle 4 10 dumpcycle 3 days 11 amrecover_changer "changer
26%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Amawasri Naksakul, 123RF.com
unnecessarily) more than 200MB of compiler tools, such as the omnipotent gcc package. Make It Snappy Unlike the init command example in Figure 6, in this case, I'm running it inside my chroot. For this example
25%
Monitor Your Nodes with collectl
28.03.2012
Home »  HPC  »  Articles  » 
Interval: 10:60 NumCPUs: 4 NumBud: 3 Flags: ix # Filters: NfsFilt: EnvFilt: # HZ: 100 Arch: x86_64-linux-thread-multi PageSize: 4096 # Cpu: AuthenticAMD Speed(MHz): 2812.629 Cores: 4 Siblings: 4 Nodes: 1
25%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
-created 09 - event: comment-added 10 comment: (?i)^(Patch Set [0-9]+:)?( [\w\\+-]*)*(\n\n)?\s*RECHECK 11 success: 12 gerrit: 13 # return to Gerrit Verified+1 14 Verified: 1 15 ... The Zuul 3 gating system is a free and flexible solution for continuous integration, delivery, and deployment. ... Zuul 3 ... Zuul 3, a modern solution for CI/CD
25%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
SecWest Core05, 2005: https://cansecwest.com/core05/2005-firewire-cansecwest.pdf "DMA attacking over USB-C and Thunderbolt 3" by Ulf Frisk, 2016: http://blog.frizk.net/2016/10/dma-attacking-over-usb-c

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice