Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%2008 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (379)
  • Article (119)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 54 Next »

17%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
, a team of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club's annual congress [5]. This attack allowed them to create a spoofed root certificate on an SSL certificate
17%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden. Managing Portability If you use the x86 version of W2G, you'll have greater portability than
17%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
,200, comprising 55 different commands, were issued. The system, a server with 768MB RAM and a Pentium 3 CPU, took a total of 22 seconds to answer them, the longest response took 32 milliseconds, the shortest
17%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations
17%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
-rw-r--r-- 1 root root 65893 Nov 10 10:25 cavp-03.pdf 0 drwxr-xr-x 1 root root 0 Nov 10 10:28 FEATURES 4173 -rw-r--r-- 1 root root 4272584 Nov 10 10:28 KonigesA-2.pdf 0 drwxr-xr-x 1 root root 0 Nov
17%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
_names.sort(key=lambda x: sum(pnic_after[x]), reverse=True)    print "Interface:"    for name in nic_names:       stats_before = pnic_before[name]       stats_after = pnic_after[name]              print
17%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
Reduce paradigm [http://discoproject.org] Hadoopy [22] Wrapper for Hadoop using Cython [http://www.hadoopy.com/en/latest/] Graph libraries NetworkX Package
17%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
fd9255658c128086395d3fa0aedd5a41ab6b034fd649d1a9260 testuser@laytonjb-MINI-S:~$ podman run -it alpine /bin/sh / # cat /etc/os-release  NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.2 PRETTY
17%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
generic-service 21 host_name ubuntusrv 22 service_description Current Users 23 check_command check_nrpe!check_users!20!50 24 } 25 26 define ... 25
17%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Corporation" \ -and $computerInfo.Model -eq "Virtual Machine") 19 { 20 $type = "Hyper-V Virtual Machine" 21 } 22 elseif($computerInfo.Manufacturer -eq "VMware, Inc

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice