Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (345)
  • Article (83)
  • News (36)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 47 Next »

25%
Cryptominers Target Cloud Infrastructure
06.09.2023
Home »  News  » 
 
of more than $430,000, reports Steven J. Vaughan-Nichols. And, he says, “according to the Google Cybersecurity Action Team (GCAT) September 2022 Threat Horizons Report, a staggering 65% of cloud accounts
25%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
, and physical memory (32- and 64-bit windows). dc3dd [2] – a tool that captures the content of memory on the infected system; dc3dd is basically the standard *nix dd utility upgraded for forensic use, which
25%
File Compression for HPC
10.11.2021
Home »  HPC  »  Articles  » 
a directory -v or -vv  creates verbose output -b uses bzip2 compression -g uses gzip compression -l uses lzo compression -L n uses compression level n (1 -9 , with 7 being the default
25%
StarCluster Toolkit: Virtualization Meets HPC
16.01.2013
Home »  HPC  »  Articles  » 
-east-1d Keypair: foocluster EBS volumes:     vol-4c048437 on master:/dev/sda (status: attached)     vol-4f048434 on node001:/dev/sda (status: attached) Cluster nodes:     master running i-6a10c710 ec2
25%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
.0.0.1/dvwa/ vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="PHPSESSID=ce0aa7922720f3190bf9bbff7f24c434;security=low" --forms After a short while, SQLmap finds the matching ID field and asks whether you
25%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
03736 bash zap@03736c2a2088:/zap$ x11vnc --forever --usepw --create Enter VNC password: Verify password: Write password to /home/zap//.vnc/passwd? [y]/n y Password written to: /home
25%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Suslov, 123RF.com
, to avoid the "integer division pitfall." Table 1 Integer Division       Result Operation Fortran C Python 2 Python 3 Julia Java
25%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
3 04 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 05 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 06 | Source Port
25%
NVDIMM and the Linux kernel
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Denis Dryashkin, 123RF.com
: [mem 0x0000000500000000-0x0000000c7fffffff] usable Speed Test If you own NVDIMMs and want to check out the speed advantage, all you need is a short test with the Unix dd tool. In Listing 3, root
25%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
as input. This procedure is described in detail at the CNI GitHub repository [9]. Calico Project Calico [3] considers the ratio of nodes to containers. The idea is to transfer the concepts and relations

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice