Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (579)
  • Article (179)
  • News (16)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 78 Next »

29%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
Manipulation The ntopng Edge (nEdge) [2] version of ntopng actively manipulates network traffic. nEdge lets you analyze network traffic at the protocol level (Layer 7) and block or restrict application
28%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
, the encryption is very good if used correctly, the code is open source, and it follows the OpenPGP specification [5], which is also an IETF standard [6]. GPG was really designed as a command-line encryption tool
28%
Spending Moore's dividend
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Lucy Baldwin, 123RF.com
as a Linux cluster in a single expansion card [6]. The Intel design is essentially a symmetric multiprocessor on a single chip die. The Xeon Phi 5110P, code-named "Knights Corner" [7], features 60 x86 cores
28%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables: prefix. Listing 1 iptable Rules 01 *filter 02 *filter 03 :INPUT ACCEPT [0:0] 04
28%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
can see how the arp cache poisoning works: $ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \ -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \ -H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
28%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
or humanly readable; for example, iso.org.dod.internet.mgmt and 1.3.6.1.2 refer to the same object, and they can be used as equivalents in queries. SNMPv1 and SNMPv2 use what are known as "communities
28%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
scrolling terminal output. For a quick example, the simple command $ watch -n 1 uptime tells watch to run a command (uptime ) every second (-n 1 ). It will continue to run this command forever unless you
28%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
3 type rec 4 integer :: x, y, z 5 real :: value 6 end type rec 7 8 integer :: counter 9 integer :: counter_limit 10 integer :: ierr 11 12 type (rec) :: my
28%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
.4 PHP 5.4 web 12 zend-6.1 PHP 5.4 with Zend Server 6.1 web 13 python-2.6 Python 2.6 web 14 python-2
28%
New Products
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Platform (HDP) 1.2 that lets users investigate and evaluate Apache Hadoop projects, such as Apache Pig, Apache Hive, Apache HCatalog, and Apache HBase, in an isolated protected environment. You can download

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice