Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (416)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 59 Next »

25%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
--reserve-mb='auto' 40 %end 41 42 %anaconda 43 pwpolicy root --minlen=6 --minquality=1 --notstrict --nochanges --notempty 44 pwpolicy user --minlen=6 --minquality=1 --notstrict --nochanges --emptyok 45
25%
Millions of Intel Processors Are Vulnerable to Attack
21.11.2017
Home »  News  » 
 
Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted.” The affected products include sixth, seventh, and eighth generation Intel Core Processor
25%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
without entering a password. That said, it does makes sense to share your own experiences with the Metasploit community – for example, on GitHub [6]. Armitage and Meterpreter To get a quick taste
25%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
in the situation where you want to run multiple jobs each with a different compiler/MPI combination. For example, say I have a job using the GCC 4.6.2 compilers using Open MPI 1.5.2, then I have a job using GCC 4
25%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
If you add an additional element to the names vector and again try to create a data frame from numbers and names, an error occurs because numbers has a length of 5 and names has a length of 6 (Listing 2
25%
StarCluster Toolkit: Virtualization Meets HPC
16.01.2013
Home »  HPC  »  Articles  » 
$ starcluster start -s 1 foocluster -n ami-999d49f0 $ starcluster get foocluster /opt/sge6-fresh . $ starcluster terminate foocluster $ starcluster start -o -s 1 -i t1.micro -n ami-e2a0058b imagehost
25%
Amazon Announces AWS Fargate
12.12.2019
Home »  News  » 
 
regions (with more to come soon): US East (N. Virginia), US East (Ohio), Europe (Ireland), and Asia Pacific (Tokyo). Original announcement: https://www.argus-press.com/news/national/article_a30c4ca6-fffc
25%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
location, use -B <n>; -A <n> does the same thing for lines after the find. You can search compressed text archives with -z -a and a combination of options (Figure 6
25%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
as of yet [6]-[8]. The only path that remains, then, is to accept that a part of the memory changes while copying. With older Linux versions, this was quite simple, because dd could copy /dev/mem locally
25%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
a freshly installed CentOS 6.4 distribution on a newly built system with smartmontools installed using yum . I also made sure the smartmontools daemon, smartd , starts with the system by using chkconfig

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice