Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%2222%A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (406)
  • Article (148)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 56 Next »

29%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
idea to choose an intuitive name. Listing 2 shows an example. Listing 2 Your Own Domain in OpenShift 01 # rhc-create-domain -n tuxgeek -l tscherf@gmail.com 02 Password: 03 Generating
29%
S.M.A.R.T., smartmontools, and drive monitoring
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © _fla, 123RF.com
source project, smartmontools [2], allows you to interact with the S.M.A.R.T. data in drives on your systems. Using this tool, you can query the drives to gather information about them, or you can test ... Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A.R.T. features ... S.M.A.R.T., smartmontools, and drive monitoring
29%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Suslov, 123RF.com
). Listing 2 Arrays julia> a = [1 2]; 1x2 Array{Int64,2}: 1 2 julia> b = [3 4]; 1x2 Array{Int64,2}: 3 4 julia> [a b] 1x4 Array{Int64,2}: 1 2 3 4 julia> [a; b] 2x2 Array{Int64,2}: 1 2 3 4
29%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
 -----------memory---------- ---swap-- -----io---- --system-- -----cpu----- 192.168.1.250:  r  b   swpd   free   buff  cache   si   so    bi    bo   in   cs us sy id wa st 192.168.1.250:  0  0      0 7248836  25632  79268    0    0    14     2   22   21  0  0 99  0  0 192.168.1
29%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
young project that was forked from Nagios [2] because of disagreements regarding the pace and direction of development. Icinga delivers improved database connectors (for MySQL, Oracle, and Postgre
29%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
server with a compromised MySQL binary. A forensics professional informed me that the following strings belonged to a Trojan: 7A 50 15 00 40 00 67 30 15 02 11 9E 68 2B C2 99 6A 59 F7 F9 8D 30
29%
Unicode migration with an Oracle database
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© joingate, 123RF.com
use what are known as national language data types (NCHAR, NVARCHAR2, or NCLOB). Converting the database to Unicode removes this need and the "N" data types can be converted back to "normal" data types
29%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
. Figure 5: Terminal after creating a new tmux window. To cycle through windows, press Ctrl+B-n (next), Ctrl+B-p (previous), or Ctrl+B-x  (where x =0-9) to go to a specific window. If you type Ctrl
29%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
and password, are added to the database query. This approach works in theory, but imagine an attacker changing the query like this: Password = ' OR 'a' = 'a' The query to the database is now: SELECT * FROM
29%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
depends on the liblzo2-2, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice