Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (426)
  • Article (120)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 55 Next »

19%
John the Ripper
22.08.2011
Home »  Articles  » 
 
:lanman passfile.txt Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2 guesses: 0 time: 1:09:25:10 (3) c/s: 10929 trying
19%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
(Figure 1). Although you will need to install the freeware program on the computer you want to examine first, the program is quite small, occupying less than 5MB of space on the hard drive
19%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
instructions but still provokes an explicit warning (Figure 3). Listing 6 Too Many Characters 01 #include 02 #include 03 #define BUFSIZE 10 04 05 int main(/*@unused@*/ int
19%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
other values passed in end up in the rest array. The three dots (splats) show that the caller can pass in an arbitrary number of values. The a 1,2,3,4,5,6 statement thus would output 3,4,5,6 . If you
19%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
19%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14 virtual webs.test.com { 15 active = 1 16 ... 3
19%
MPI Apps with Singularity and Docker
18.03.2020
Home »  HPC  »  Articles  » 
        2 hours ago         9.83GB                                         49cbd14ae32f        3 hours ago         269MB ubuntu              18.04               72300a873c2c        3 weeks ago         64.2MB
19%
MariaDB MaxScale: A smart proxy for MySQL
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
the respective SQL query to one of its back ends. A cache for login credentials is also involved. Installation and Configuration MaxScale is available from the MariaDB website as a free download [3
19%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
19%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
be in place, if you want the host to behave as it should: bridge-utils quantum-plugin-openvswitch-agent / quantum-l3-agent / quantum-dhcp-agent python-keystone / python

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 55 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice