Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (479)
  • Article (168)
  • News (39)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 69 Next »

17%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware
17%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
kernel ordinal number (%n). Listing 3 70-persistent-net.rules Rules for KVM: SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="52:54:00:*", KERNEL=="eth*", NAME="eth%n" Rules
17%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
to show seconds and microseconds since the beginning of the Unix epoch (00:00:00 UTC on January 1, 1970) (Figure 3). Figure 3: Reporting time since
17%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
, the problem of writing a dump to an MD RAID or transferring larger kernel images ultimately proved unfixable. Further attempts with Netdump (Red Hat) or Diskdump [3] in 2002 and 2004 also had only moderate
17%
Veeam Agent for Linux backup software
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
to occur every night of the week at 3:00am. This involved backing up an entire Ubuntu installation in a bootable image on network-attached storage (NAS) in the local network (Figure 3). When backing up
17%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
17%
Caching with CacheFS
07.07.2020
Home »  HPC  »  Articles  » 
. This architecture allows FS-Cache to use alternative caching mechanisms. The first implementation of CacheFS was developed by Sun Microsystems in 1993 for the Solaris 2.3 operating system. After that, other versions
17%
ISC 2020 Goes Virtual
15.04.2020
Home »  HPC  »  News  » 
 
. According to the announcement at the ISC website, this year’s event, which was scheduled for June 22-24 will move to an online format that will be “free to everyone so the HPC community can benefit from it
17%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
Model Number: INTEL SSDSC2CW240A3 Serial Number: XXXXXXXXXXXXXXXXXX Firmware Revision: 400i Transport: Serial, ATA8-AST, SATA 1.0a, SATA II [...] Commands
17%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
this article. TensorFlow provides stable Python (for version 3.7) and C APIs. However, other programming languages supported without guaranteed API backward compatibility are C++, Go, Java, Java

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 69 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice