Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm&253%2000 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (377)
  • Article (117)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 54 Next »

30%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
: 156301488 20 Logical Sector size: 512 bytes 21 Physical Sector size: 512 bytes 22 device size with M = 1024*1024: 76319 MBytes 23
30%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
, a team of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club's annual congress [5]. This attack allowed them to create a spoofed root certificate on an SSL certificate
30%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86 version of W2G, you'll have greater portability than
30%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
,200, comprising 55 different commands, were issued. The system, a server with 768MB RAM and a Pentium 3 CPU, took a total of 22 seconds to answer them, the longest response took 32 milliseconds, the shortest
30%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations
30%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
-rw-r--r-- 1 root root 65893 Nov 10 10:25 cavp-03.pdf 0 drwxr-xr-x 1 root root 0 Nov 10 10:28 FEATURES 4173 -rw-r--r-- 1 root root 4272584 Nov 10 10:28 KonigesA-2.pdf 0 drwxr-xr-x 1 root root 0 Nov
30%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
_names.sort(key=lambda x: sum(pnic_after[x]), reverse=True)    print "Interface:"    for name in nic_names:       stats_before = pnic_before[name]       stats_after = pnic_after[name]              print
30%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
Reduce paradigm [http://discoproject.org] Hadoopy [22] Wrapper for Hadoop using Cython [http://www.hadoopy.com/en/latest/] Graph libraries NetworkX Package
30%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
.part.22 12 Generating manifest /tmp/centos.5- 3.x86.img.manifest.xml 13 14 $ euca- register images/centos.5- 3.x86.img.manifest.xml 15 IMAGE emi- c658102B When all three parts have been uploaded
30%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
fd9255658c128086395d3fa0aedd5a41ab6b034fd649d1a9260 testuser@laytonjb-MINI-S:~$ podman run -it alpine /bin/sh / # cat /etc/os-release  NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.2 PRETTY

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice