Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (415)
  • Article (51)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 47 Next »

86%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
WScript run time COM WMI Error object – WSH documentation PowerShell Cmdlets WMI WMI COM/DCOM .NET Try … Catch X get-help Completion
86%
Warewulf 4
13.12.2022
Home »  HPC  »  Articles  » 
 GPG key 0xD71AB47F:  Userid     : "Ctrl IQ, Inc. "  Fingerprint: 0BF7 3422 0FF7 326C 5DE9 E196 E97E 8F85 D71A B47F  From       : /etc/pki/rpm-gpg/RPM-GPG-KEY-ctrliq Key imported successfully Running
86%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
additional packages. Listing 3:  Setting Up the Install System # mkdir -p /data0/repo/CentOS/5.6/iso/x86_64 # ln -s /data0/repo /repo # cd /repo/CentOS # ln -s 5.6 5 # wget http://mirrors.gigenet.com
86%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3
86%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
Security X-Force in 2010 came to the conclusion that one third of all hypervisors suffer from vulnerability gaps [7]. Virtualizing a firewall on the same host as internal IT resources (e.g., domain
86%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
the default website and the virtual host website. Listing 7 A Self-Signed Certificate cd /root/certs openssl genrsa -out default-serverkey.pem 2048 openssl req -new -x509 -days 3650 -key default
86%
Have a Bash with the Zing network utility
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Micah Tindell on Unsplash
of the number of ports, the count, and the limit of the operation. The defaults are ports = 2, count = 6, and limit = 4, so the product, 2x6x4=48, is the total number of netcat operations. The fourth and final
86%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
. Listing 1 kube-system Namespace Pods $ kubectl get pods -n kube-system NAME READY STATUS RESTARTS AGE coredns-5644d7b6d9-7n5qq 1/1 Running 1
86%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
into smaller sections with the pointer pointing to that subsection (Listing 7). Listing 6 Pointers 01 PROGRAM PTR_TEST1 02 INTEGER, POINTER :: PTR1 03 INTEGER, TARGET :: X=42, Y=114 04
86%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
-gruppenrichtlinien-de.translate.goog/artikel/migration-laps-legacy-zu-laps-nativ?_x_tr_sl=de&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp Privileged access model: https://learn.microsoft.com/en

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice