Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (409)
  • Article (82)
  • News (35)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 53 Next »

25%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
(2208)? [Y] Yes [A] Yes to All [N] No [L] No to All [?] Help (default is "Y"): Y The process will end immediately on receipt of the Stop-Process signal. Now try to run a CMD process
25%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
 def    # # Routine to add commas to a float string # def commify3(amount):     amount = str(amount)     amount = amount[::-1]     amount = re.sub(r"(\d\d\d)(?=\d)(?!\d*\.)", r"\1,", amount)     return amount[::-1
25%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
protocols, for example, http-brute, oracle-brute, and snmp-brute. default These are standard scripts that are used if you run Nmap with the -sC or -A options. discovery
25%
ISC Conference Call for Volunteers
26.01.2022
Home »  HPC  »  News  » 
 
The ISC 2022 high-performance computing conference, which will take place in Hamburg, Germany on May 29-June 2, 2022, has announced that applications for the student volunteer program are now open
25%
A New Linux Vulnerability Could Provide Root Access to Systems
28.04.2022
Home »  News  » 
 
Dubbed “Nimbuspwn,” the vulnerabilities (CVE-2022-29799 and CVE-2022-29800) are located in the networkd-dispatcher daemon that checks for systemd-networkd connection status changes. According
25%
OpenSSL 3.0.7 Patches Serious Vulnerabilities
03.11.2022
Home »  News  » 
 
OpenSSL has issued an advisory relating to two vulnerabilities (CVE-2022-3602 and CVE-2022-3786), which affect OpenSSL version 3.0.0. These vulnerabilities have been addressed with the release ... OpenSSL 3.0.7 Patches Serious Vulnerabilities
25%
Demand for Tech Talent Remains High
28.11.2022
Home »  News  » 
 
Despite industry layoffs, economic challenges, and reported hiring freezes, demand for tech talent remains high, according to a recent survey from Dice, “with more than 3.8 million tech jobs posted
25%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
--------- ------ ---- ----- ---- 12 Throughput Cashier Customers 0.7500 Cust/Sec 13 Utilization Cashier Customers 75.0000 Percent 14 Queue Length Cashier Customers 3.0000 Cust 15 Residence Time Cashier Customers 4.0000 Sec 16 N Sws
25%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
)*   Julia Python MATLAB Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31
25%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
(6192 bits), 774 bytes captured (6192 bits) Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:6f:7g:8h:9i:0j Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104 User Datagram Protocol, Src Port

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice