Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (194)
  • Article (78)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 Next »

14%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
or thousands of nodes; therefore, admins needed a way to send the same command to a number of nodes or a fixed set of nodes. In a past article [3], I wrote about a class of tools that accomplishes this goal
14%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real
14%
Building a port scanner in Python
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Leo Blanchette, 123RF.com
installed on your system. If Python is not installed, you can install it with: sudo apt install python3 With VS Code and the necessary extensions set up, you are now ready to start developing your port
14%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
to jail>; 10 j.hostname = ; 11 j.ip_number = ; 12 /* call system call */ 13 i = jail(&j); 14 [...] 15 execv(, ...); 16 [...] 17 exit(0); 18
14%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
: chris@linux.tld [->] Subject: Picture yourself, on a boat, on a river [->] User-Agent: Heirloom mailx 12.5 6/20/10 [->] MIME-Version: 1.0 [->] Content-Type: multipart/mixed; boundary="=_546791b1.cwvb6n4
14%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory
14%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
the output. For example: nmap -sV --script exploit -d3 targethost NSE scripts have a clear-cut structure. This becomes most clear when you take a look at an existing script. The scripts not only define
14%
Automation with Chef
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Pablo Bustos on Unsplash
necessary. Components A typical Chef environment contains different components depending on the desired scope [3]. The minimum setup that will let you proceed is the Chef Infra Client, which plays the role
14%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Management Console [3] Lambda service page with an orange Create function button. Figure 1: The page where you will create a Lambda function. If you
14%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
seconds set connect timeout (default is 10 sec) -u seconds set command timeout (no default) -f n use fanout of n nodes -w host,host,... set target node list on command line -x

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice