55%
27.05.2025
think of it in system administration terminology of job satisfaction vs. burnout.
I've written about this topic before, but I think you need to evaluate or re-evaluate your life's purpose, your job
55%
09.03.2025
Lately, I’ve been thinking more about what’s happening in the world of HPC. The items that have risen to the top are the following:
During SC24 I had a few very enthusiastic people ask me how
54%
05.02.2019
Quite a lot has been written about pen testing and hacker lifecycles. Over the past few months, for example, I've written a couple of articles for ADMIN
about penetration testing: one about
54%
07.10.2014
of these tools may be familiar and some may be new, but I've found them to be very useful and sometimes wildly creative.
top
When I get a login to the server, the first tool I run is Top, because I get a quick
54%
10.04.2015
a year before the End of Life deadline, and I'll probably stick with Windows 7 until any device using it dies.
After experiencing Windows 8, I decided to make the switch to something that works. I've
54%
25.03.2020
of these discussions and they can get quite animated. I think there's a lot of respect in there for people regardless of which of the members of the ecosystem they're working for at this moment. Because I've been
54%
14.11.2013
a job or perform a task – a task or job that might otherwise be impossible to complete. I've often heard it said that you should always use the right tool for the job. That makes sense to me. But what
54%
18.07.2013
.
That is not to say that all IT traditions are bad, but you have to use your powers of discernment to decide which are valid and which are bogus.
Most of the failed traditions I've seen surround the creation of "gold
54%
17.07.2023
This article is a first for me. Although I’ve written a few “how-to” articles, this is really my first “my summer at camp” article. My Python installation had recently stopped working and some of my
54%
13.12.2018
that most attackers will take when compromising a resource in the cloud – or even in a traditional network. I've seen quite a few useful pen testing/hacker lifecycle models, and although none are perfect, two