Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (220)
  • Article (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 24 Next »

26%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
must be careful not to falsify or even destroy the evidence. This problem is not restricted to the digital world but applies equally to, say, forensic medicine. The advantage of collecting digital
26%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
of Footloose, move it to the system path, and make it executable (requires sudo privileges on GNU/Linux), enter: curl -sSLk "https://github.com/$(curl -sSLk https
26%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
) in the top-of-the-range version [3]. The client component supports Microsoft Windows, macOS, and Linux – macOS and Linux in conjunction with both x86-64 and ARM processors, whereas Windows currently only runs
25%
Project management with Phabricator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Joy Fera, fotolia.com
, you first need to check it out of the GitHub repository in three parts; however, first, create the /var/www/phabricator directory: $ mkdir /var/www/phabricator && cd $_ $ git clone https
25%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
code is written and compiled in one of three classic HPC languages: Fortran [2], C++ [3], or C [4]. Why these languages? Because they have enabled generation of very efficient code for a long time
25%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
of the DIB sector, the DoD cannot scale its organic cybersecurity assessment capability to conduct on-site assessments of approximately 220,000 DoD contractors every three years. As a result, the Department
25%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
setting, which ensures that passwords must contain three out of four possible character types – uppercase letters, lowercase letters, numbers, and symbols. A variable system that rewards people who use
25%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
from the GitHub README: Mutillidae II boasts 40+ vulnerabilities and challenges. Each of the highly regarded OWASP Top 10 security threats are covered (all the threats are included from the 2007
25%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
administrators, we continue to reinforce Linux as the bedrock for enterprise digital transformation." For more information about Red Hat Enterprise Linux 8.3, read the official release notes (https://access
25%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
The second question I need to answer from the top three storage questions [1] a friend sent me is "How do you know where data is located after a job is finished?" This is an excellent question

« Previous 1 2 3 4 5 6 7 8 9 10 ... 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice