Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (139)
  • Article (102)
  • Blog post (6)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 25 Next »

55%
Welcome
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © xtrekx, 123RF.com
think of it in system administration terminology of job satisfaction vs. burnout. I've written about this topic before, but I think you need to evaluate or re-evaluate your life's purpose, your job
55%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
Lately, I’ve been thinking more about what’s happening in the world of HPC. The items that have risen to the top are the following: During SC24 I had a few very enthusiastic people ask me how
54%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
Quite a lot has been written about pen testing and hacker lifecycles. Over the past few months, for example, I've written a couple of articles for ADMIN about penetration testing: one about
54%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
of these tools may be familiar and some may be new, but I've found them to be very useful and sometimes wildly creative. top When I get a login to the server, the first tool I run is Top, because I get a quick
54%
Welcome
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © mmediac, 123RF.com and Tom Wang, Fotolia.com
a year before the End of Life deadline, and I'll probably stick with Windows 7 until any device using it dies. After experiencing Windows 8, I decided to make the switch to something that works. I've
54%
Interview with the MariaDB Foundation board Chairman Eric Herman
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
of these discussions and they can get quite animated. I think there's a lot of respect in there for people regardless of which of the members of the ecosystem they're working for at this moment. Because I've been
54%
The Tools You Use Define You
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
a job or perform a task – a task or job that might otherwise be impossible to complete. I've often heard it said that you should always use the right tool for the job. That makes sense to me. But what
54%
Getting Past the Passion for Passing on Dysfunctional Practices
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Emil Imarietli, 123RF
. That is not to say that all IT traditions are bad, but you have to use your powers of discernment to decide which are valid and which are bogus. Most of the failed traditions I've seen surround the creation of "gold
54%
(Re)Installing Python
17.07.2023
Home »  HPC  »  Articles  » 
This article is a first for me. Although I’ve written a few “how-to” articles, this is really my first “my summer at camp” article. My Python installation had recently stopped working and some of my
54%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
that most attackers will take when compromising a resource in the cloud – or even in a traditional network. I've seen quite a few useful pen testing/hacker lifecycle models, and although none are perfect, two

« Previous 1 2 3 4 5 6 7 8 9 10 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice