Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 146 Next »

25%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stockbksts, 123RF.com
credentials stored in the browser. Internally, the tool offers file, hex, string, and text views. However, files can also be viewed using external programs and linked. After the investigation, a case report
25%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
The line starts with the username and is followed by the host on which klaus is allowed to run the command. In this case, he must be working on his own computer, marvin . If Klaus sees an error message
25%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
: [laytonjb@home4 ~]$ pdsh -w 192.168.1.250 uname -r 192.168.1.250: 2.6.32-431.11.2.el6.x86_64 The -w option means I am specifying the node(s) that will run the command. In this case, I specified the IP
25%
Programming with OpenMP
07.11.2011
Home »  HPC  »  Articles  » 
significantly, but only if the CPU really has to work hard – and if the task lends itself to parallelization. Such is often the case when working with computationally intensive programs. One, Two, Many The Open
25%
Preload Trick
11.05.2021
Home »  HPC  »  Articles  » 
the usual library without having to change itor the application. A classic use case for an intercept library is for gathering telemetry (information) about I/O functions. With LD_PRELOAD, the intercept
25%
Protecting documents with Azure Information Protection
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
a trial subscription directly or extend your existing subscription if you are already a customer of Microsoft's cloud. In both cases, you can test AIP for 90 days. Each user must be assigned a license from
25%
Best practices for secure script programming
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Jorge Fernández Salas on Unsplash
" echo > /tmp/mydata chmod og-rwx /tmp/mydata echo "$SECRETDATA" > /tmp/mydata Problems arise if an attacker monitors the temp file with the very fast acting FileSystem Watcher API. In the case
25%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
: In this case, the virtual machine is running as the root user. If a program were to break out, it would also have full root privileges. Alternatively, you can use the libvirt tools to manage your virtual
25%
Tools for automation in the cloud
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Cytonn Photography on Unsplash
be a complex setup process (e.g., rolling out the Puppet master in the case of Puppet). Where such solutions exist, I will point them out, but my focus is clearly on the capabilities of the individual automators
25%
The 10 best tricks for taming Ansible
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © neoleo3d, 123RF.com
not contain any immediate steps to be performed on the hosts. In exceptional cases, this principle can be ignored for a single command or a task. However, for the sake of clarity, it is better to create

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice