Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%2000 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (359)
  • Article (116)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 52 Next »

30%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
, a team of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club's annual congress [5]. This attack allowed them to create a spoofed root certificate on an SSL certificate
30%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86 version of W2G, you'll have greater portability than
30%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
,200, comprising 55 different commands, were issued. The system, a server with 768MB RAM and a Pentium 3 CPU, took a total of 22 seconds to answer them, the longest response took 32 milliseconds, the shortest
30%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
-rw-r--r-- 1 root root 65893 Nov 10 10:25 cavp-03.pdf 0 drwxr-xr-x 1 root root 0 Nov 10 10:28 FEATURES 4173 -rw-r--r-- 1 root root 4272584 Nov 10 10:28 KonigesA-2.pdf 0 drwxr-xr-x 1 root root 0 Nov
30%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
_names.sort(key=lambda x: sum(pnic_after[x]), reverse=True)    print "Interface:"    for name in nic_names:       stats_before = pnic_before[name]       stats_after = pnic_after[name]              print
30%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
Reduce paradigm [http://discoproject.org] Hadoopy [22] Wrapper for Hadoop using Cython [http://www.hadoopy.com/en/latest/] Graph libraries NetworkX Package
30%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
.part.22 12 Generating manifest /tmp/centos.5- 3.x86.img.manifest.xml 13 14 $ euca- register images/centos.5- 3.x86.img.manifest.xml 15 IMAGE emi- c658102B When all three parts have been uploaded
30%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
fd9255658c128086395d3fa0aedd5a41ab6b034fd649d1a9260 testuser@laytonjb-MINI-S:~$ podman run -it alpine /bin/sh / # cat /etc/os-release  NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.2 PRETTY
30%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
generic-service 21 host_name ubuntusrv 22 service_description Current Users 23 check_command check_nrpe!check_users!20!50 24 } 25 26 define ... 25
30%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Corporation" \ -and $computerInfo.Model -eq "Virtual Machine") 19 { 20 $type = "Hyper-V Virtual Machine" 21 } 22 elseif($computerInfo.Manufacturer -eq "VMware, Inc

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice