Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (402)
  • Article (152)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 57 Next »

19%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware
19%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
sports a few additional capabilities, the most noteworthy being its ability to measure page faults and swapping activity by the tested binary: $ /usr/bin/time gcc test.c -o test 0.03user 0.01system 0:00
19%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
% |****************************************************************| 111k 0:00:00 ETA 'revershell.ko' saved On the host, you can verify that the kernel has been loaded successfully by running lsmod and searching for the name of the module. In Figure 3 you can see
19%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
{ 22 System.out.println("Expected arguments: [nfs server] [nfs path]"); 23 return; 24 } 25 26 Server server = new Server(args[0], args[1
19%
HDF5 and Parallel I/O
17.05.2017
Home »  HPC  »  Articles  » 
, 5 ) / ( 8, 5 ) }       DATA {       (0,0): 0, 1, 2, 3, 4,       (1,0): 5, 6, 7, 8, 9,       (2,0): 10, 11, 12, 13, 14,       (3,0): 15, 16, 17, 18, 19,       (4,0): 20, 21, 22, 23, 24,       (5,0): 25, 26, 27, 28, 29,       (6,0
18%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
": executable file not found in $PATH 0a2091b63bc5de710238fadc68ba3f5e0f9af8800ec7f76fd52a84c49a1ab0a7 Listing 3 shows that I do have a working container, so I'll deal with the network namespace error now
18%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
to show seconds and microseconds since the beginning of the Unix epoch (00:00:00 UTC on January 1, 1970) (Figure 3). Figure 3: Reporting time since
18%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
of 00:d0:a7:b1:c7:de on eth1, the following command will do the trick: ip neigh add 10.1.1.1 lladdr 00:d0:a7:b1:c7:de dev eth1 nud perm Here, nud stands for Neighbor Unreachability Detection
18%
S.M.A.R.T., smartmontools, and drive monitoring
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © _fla, 123RF.com
Barracuda (SATA 3Gb/s, 4K Sectors) Device Model: ST3000DM001-1CH166 Serial Number: Z1F35P0G LU WWN Device Id: 5 000c50 050b954c3 Firmware Version: CC27 User Capacity: 3,000,592,982,016 bytes [3.00 TB] Sector
18%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
                               3.105ubuntu1                add and remove users and groups ii  ant                                   1.7.0-3                     Java based build tool like make ii  antlr

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice