Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (404)
  • Article (83)
  • News (36)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 53 Next »

24%
ISC Conference Call for Volunteers
26.01.2022
Home »  HPC  »  News  » 
 
The ISC 2022 high-performance computing conference, which will take place in Hamburg, Germany on May 29-June 2, 2022, has announced that applications for the student volunteer program are now open
24%
A New Linux Vulnerability Could Provide Root Access to Systems
28.04.2022
Home »  News  » 
 
Dubbed “Nimbuspwn,” the vulnerabilities (CVE-2022-29799 and CVE-2022-29800) are located in the networkd-dispatcher daemon that checks for systemd-networkd connection status changes. According
24%
OpenSSL 3.0.7 Patches Serious Vulnerabilities
03.11.2022
Home »  News  » 
 
OpenSSL has issued an advisory relating to two vulnerabilities (CVE-2022-3602 and CVE-2022-3786), which affect OpenSSL version 3.0.0. These vulnerabilities have been addressed with the release ... OpenSSL 3.0.7 Patches Serious Vulnerabilities
24%
Demand for Tech Talent Remains High
28.11.2022
Home »  News  » 
 
Despite industry layoffs, economic challenges, and reported hiring freezes, demand for tech talent remains high, according to a recent survey from Dice, “with more than 3.8 million tech jobs posted
24%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
lacks support for SSH access and access to the hard disks' S.M.A.R.T data. Thecus N6850 We imported the Thecus N6850 from its vendor in the Far East, but you can buy it directly from dealers. What you
24%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
--------- ------ ---- ----- ---- 12 Throughput Cashier Customers 0.7500 Cust/Sec 13 Utilization Cashier Customers 75.0000 Percent 14 Queue Length Cashier Customers 3.0000 Cust 15 Residence Time Cashier Customers 4.0000 Sec 16 N Sws
24%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
)*   Julia Python MATLAB Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31
24%
Free Enterprise Backup with Bareos
12.11.2013
Home »  Articles  » 
they are addressed Which files should be backed up (a FileSet) The plugin configuration The before and after jobs (i.e., programs that are started before or after a backup job, e.g., to start and stop
24%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
. The pwgen command generates a password and encrypts with sh256sum: pwgen -N 1 -s 100 echo -n | sha256sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
24%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
://127.0.0.1/dvwa/ vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="PHPSESSID=ce0aa7922720f3190bf9bbff7f24c434;security=low" --forms After a short while, SQLmap finds the matching ID field and asks

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice