Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (119)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 151 Next »

19%
Wireshark
27.11.2011
Home »  Articles  » 
 
to the network interface’s link layer. Administrators can control Tcpdump’s behavior at the command line by passing in parameters, including the filters to use. Ethereal and Wireshark Because a command
19%
Tips and Tricks for Containers
12.05.2020
Home »  HPC  »  Articles  » 
.04"         ],         "RepoDigests": [             "nvidia/cuda@sha256:3cb86d1437161ef6998c4a681f2ca4150368946cc8e09c5e5178e3598110539f"         ],         "Parent": "",         "Comment": "",         "Created": "2019-11-27T20:00
19%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:net_conf_t:s0 nametype=NORMAL type=CWD msg=audit(1404225360.791:124138): cwd="/home/tscherf" type=SYSCALL msg=audit(1404225360.791:124138): arch=c000003
19%
Monitor Your Nodes with collectl
28.03.2012
Home »  HPC  »  Articles  » 
/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize ################################################################################ # Collectl: V3.6.1-4 HiRes: 1 Options: -p localhost-20120310-133840.raw.gz -P -f
19%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
scanner’s -sL option (nmap -sL ) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed. In addition to these standard DNS tools, a pair ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
19%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
, the use of in-memory storage engines, and advanced compression algorithms. MongoDB Atlas is the fully managed, cloud-based database-as-a-service (DBaaS) platform. Atlas automates management tasks (i
19%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
+ blog posts. Horowitz explains that Google+ is different. “It’s not just the engagement,” he says. “It’s the rate of engagement and the intensity of engagement.”  But, Horowitz also says developers ... Google+ isn’t officially ready for corporate use, but users are already excited about what this new social networking platform means for the workplace. We look at how you can leverage Google’s
19%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
19%
Simple, small-scale Kubernetes distributions for the edge
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © grafner, 123RF.com
containers for edge operation. In this article, I look at three of these distributions: K3s (SUSE), MicroShift (Red Hat), and MicroK8s (Canonical). Of course, you will find other lean distributions
19%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/" 20 21 echo $newid >> vm-list.txt 22 23 echo "cloning finished, starting vm" 24 virsh start $vmname

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice