Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (486)
  • Article (157)
  • Blog post (5)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 66 Next »

15%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
. To continue providing a free scanner, the open source project OpenVAS was formed; it builds on the last free version (2.2) of the scanner and has been developed independently ever since the fork. Focus ... SecurityX-Ray
15%
Parallelizing and memorizing Python programs with Joblib
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
bottleneck is reading and writing data to the local hard disk or across the network, rather than processor power, the number of processes can be higher. As a rule of thumb, you can go for the number
15%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
If the first item on a sys admin’s to-do list is building a Linux server, then the second item is surely monitoring that server. If you’ve been a sys admin for a while, you’ve almost definitely been
15%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
accounts to have been removed from the group. You can go into even more detail by pressing the Changes button. Another window provides data on when accounts were added and removed. In this context, I need
15%
Analyzing Logs
03.11.2022
Home »  HPC  »  Articles  » 
for a price. Rather than dig into the tools and stacks, I’m going to discuss the ELK stack and its components briefly. This stack was the original open source log analysis stack designed to replace Splunk
15%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
are logged nicely to /var/log/tcp-wrappers.log : ALL : .example.com \ : spawn (/bin/echo %a from %h triggered an alarm %d >> \ /var/log/tcp-wrappers.log) \ : deny Going one step further this next example
15%
Revamp your software architectures with Domain-Driven Transformation
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © faithie, 123RF.com
experience of the IT industry shows that the second approach – replacing the legacy system step-by-step with a new system that grows by increments (Figure 2) – works better than the big bang
15%
The Resurrection of bWatch
02.06.2025
Home »  Articles  » 
Photo by NASA Hubble Space Telescope on Unsplash
. It was Beowulf. No, not the Scandinavian warrior, but an approach to high-performance computing (HPC) that uses common x86 processors, conventional Ethernet networking, the Message Passing Interface (MPI
15%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Role permission to restrict which role a user can pass to an EC2 instance when the user launches the instance. This helps prevent the user from running applications that have more permissions than the user has been
15%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
to establish that they have been attacked. Infos Autoruns: https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns Pass the hash: https://en.wikipedia.org/wiki/Pass_the_hash Virus

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice