Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (241)
  • News (8)
  • Article (7)
Keywords

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 Next »

31%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
Windows versions from NT 4.0 and the current versions come with the msinfo32 command-line program, which reports a first look of the machine hardware. The program offers a good overview of the available
31%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
. By mixing and matching payloads, encoders, and NOP slide generators [2] with exploit modules, you can solve almost any exploit-related task. In previous articles, I introduced you to the metasploit
31%
A first look at Apache 2.4: Web server for the cloud
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Helder Almeida, 123RF.com
for their documentation. Although at times it's a bit terse, it is very complete. The Apache 2.4 release, although a fairly modest bump compared with the move from the 1.x series to 2.0.x, is a pretty important release ... High performance and cloud suitability are the thrust of Apache 2.4. We give you the lowdown on transitioning your Apache HTTP Server from 2.2 to 2.4. ... Apache 2.4 ... A first look at Apache 2.4: Web server for the cloud
31%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
remove some of the cost issue by purchasing the 16GB model with WiFi and 3GB for US$ 629 (iPad 2). The original iPad similarly equipped costs about half that amount. Don't worry about the 16GB of space
31%
Can your web server be toppled with a single command?
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Almagami, 123RF.com
– and you'll sleep better at night. Infos Apache HTTP server benchmarking tool, ab: http://httpd.apache.org/docs/2.0/programs/ab.html ha.ckers.org website: http://ha.ckers.org/slowloris
31%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in the scope of Industry 4.0 or smart factory initiatives. Although cyber risk management is required by law (e.g., in NIS2), ASM is not. However, any company that becomes aware of attack surfaces as part of its
31%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
comparison in Table 1. Table 1 Five Graph Databases Name Neo4j 1.6 Sones Graph DB 2.0 InfoGrid 2.9.5 HyperGraphDB 1.1 VertexDB Homepage http
31%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
such as Amazon Simple Storage Service (S3), instead using the components already available in Kubeflow. Kubeflow Kubeflow is surfing the popular wave surrounding Linux containers (Figure 2). As the name suggests
31%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
, within enterprise Linux distributions, Podman [2] has been the preferred container engine for a while. Both Red Hat Enterprise Linux and SUSE Linux Enterprise have adopted Podman, as have their associated
31%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
-Anonymity ID Age Gender Zip Code Original Data 1 34 M 12345 2 36 F 12346 3 37 F 12347 4 35

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice