Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (403)
  • Article (105)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 52 Next »

65%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
now easily and securely access your AWS resources with MFA enabled. Gemalto offers two supported devices. The Ezio Time-based 6-Digit Token ... 22
65%
Tool your HPC systems for data analytics
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Sergey Nivens, 123RF.com
[6] Julia (up and coming) [7] Java [8] Matlab [9] and Matlab-compatible tools (Octave [10], Scilab [11], etc.) Java is the lingua franca of MapReduce [12] and Hadoop [13]. Many toolkits ... 22
63%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2 ... 6
63%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
) DDR3-2133 (1066) DDR4-1600 (800) to DDR4-3200 (1,600) Prefetching Dual prefetch (2-bit) Quadruple prefetch (4-bit) 8x prefetch (8-bit) 8x prefetch with two ... 6
63%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
100 0.067 95 23 5 10 99 0.099 96 22 6 20 94 0.210 97 22 6 Unfortunately ... 6
63%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
magazine [6]. Infos PAL: http://pal.codeplex.com Log Parser 2.2: http://www.microsoft.com/downloads/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07&DisplayLang=en Office 2003 Add ... 6
63%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
is adding these entries to the Cobbler database. A typical example looks something like Listing 1. Listing 1 System Settings 01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
63%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
:5 rwm 18 # consoles 19 lxc.cgroup.devices.allow = c 5:1 rwm 20 lxc.cgroup.devices.allow = c 5:0 rwm 21 lxc.cgroup.devices.allow = c 4:0 rwm 22 lxc.cgroup.devices.allow = c 4:1 rwm 23 # /dev/{,u}random 24 ... 6
63%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
63%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
another could allow the user to set up memory of between 1 and 8GB in increments of 512MB. The Deltacloud API bundles all these possibilities into hardware profiles, which means the clients are provided ... 6

« Previous 1 2 3 4 5 6 7 8 9 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice