Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3!490 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (363)
  • Article (115)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 52 Next »

30%
News for Admins
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
StarlingX 8.0 Edge Platform Announced Version 8.0 of the StarlingX (https://www.starlingx.io/software/) open source cloud platform has been released. The platform is designed for edge computing ... In the news: StarlingX 8.0 Edge Platform; Synopsys Report Shows "Alarming" Increase in High-Risk Vulnerabilities; Akamai Connected Cloud; Red Hat Enterprise Linux Available on Oracle Cloud; Wine 8
30%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
19 ******************************************/ 20 module "gke" { 21 source = "terraform-google-modules/kubernetes-engine/google" 22 project_id = var.project_id 23
30%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
]. Distributions in the Microsoft Store Debian GNU/Linux Fedora Remix for WSL Kali Linux Ubuntu 22.04 LTS, 20.04, 20.04 ARM, 18.04, 18.04 ARM, 16.04 SUSE Linux Enterprise Server 15 SP3, 15 SP2
30%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
.5Gbps (Figure 7). As you are now hitting the limits of a single network socket, your next test ramps up to 20 parallel connections: $ iperf3 -c 172.31.20.174 -i 2 -P 20
30%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
updates once only at branch offices also saves network bandwidth. Only Signed Apps Device Guard [3] is a new technology in Windows 10 that aims to prevent malicious software from running on the system
30%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
-fastcgi are running, as expected. Listing 1 Process List root 589 0.0 0.3 142492 3092 ? Ss 20:35 0:00 nginx: master process /usr/sbin/nginx -g daemon on; master_process on; www
30%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
this script, please let me know, preferably in Python 06 # hanscees@AT@hanscees.com 07 # modified from https://gist.github.com/cirocosta/17ea17be7ac11594cb0f290b0a3ac0d1x 08 09 set -o errexit 10 11 main() { 12
30%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
return -timespec_diff(sooner, later); 19 else 20 return 21 (later->tv_sec - sooner->tv_sec) 22 /* tv_nsec is known to be a signed type. */ 23 + (later->tv_nsec - sooner
30%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
node-builder_1 | 18 node-builder_1 | npm install -g pushstate-server 19 node-builder_1 | pushstate-server build 20 node-builder_1 | open http://localhost:9000 21 node-builder_1 | 22 node
30%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [3]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice