Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (240)
  • News (3)
  • Article (2)
Keywords

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 Next »

17%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
, the financial services sector continues to be the most targeted industry sector for phishing attacks, with 38.1 percent of targeted attacks; it is followed by the payment services (21.5%) and retail (13.6
17%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
of the infrastructure. For a first impression or in a small environment, Wazuh provides a virtual machine [6] that contains all services and appears at https:// after booting. Without agents, though
17%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
(Figure 6). Figure 6: Registered attacks on various ports of production systems at the University of Bonn courtesy of HoneypotMe. All told, some 3
17%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
and change to the Remote Macros tab. There, you can press a button to add a new command, type the command in the Command line, and even add an intuitive name (Figure 6
17%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
lines that are added to the emails. You should also insert the headers recommended in the corresponding RFC (Listing 6). These headers set Reply-To to the list address, provide a contact address for error
17%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
(language), whether this is a reseller account (if this account can create other accounts), and so on. One rather interesting choice you need to make is the package you are selling your client (see Figure 6
17%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
to present information about system GPUs in a clear format and can be used on Intel iGPUs, which are better than or equal to Gen6, and NVIDIA GPUs with a compute capability greater than or equal to 2.0. Unlike
17%
Redundant network connections with VMware ESX
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sabine, Fotolia
Channel Load-Balancing Addresses Used Per-Protocol: Non-IP: Source MAC address IPv4: Source MAC address IPv6: Source MAC address By default, the sender-side MAC address decides which physical port
17%
Chive: Web 2.0 front end for SQL database management
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© vicspacewalker, 123RF.com
, extension=pdo.so enable the database-specific driver. For this article, I installed the Chive version current in January 2012. A newer version 1.0.3 was released March 18, 2012 [6]. To get started
17%
Fishing with Remora
09.12.2025
Home »  Articles  » 
 
. Figure 4: Remora GPU utilization plot for the MPI EXAMPLE (6x4 grid). Summary In this article, I demonstrated how HPC users can benefit from simple timing techniques and system-level monitoring

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice