Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 171 Next »

24%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
random MAC addresses and sends them out to the interface. Listing 1 Generating random MAC addresses root@kali:~# macof -e eth1 e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0
24%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
GitHub page, as belonging to "Docker analysis & hacking tools." A YouTube video about the tool [4] jumps straight to the point by admitting that it dissects Docker images and abuses an image registry
24%
Upgrade Fever
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Apple products, although I had previously vowed to embrace them after purchasing an iPad and new iPhone 4. Note here that the iPhone 4 is now two generations behind the latest in Apple iPhone technology
24%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
|         0|            0|            0|  0.00%|# md test code      2|         0|            0|            0|  0.00%|      3|         2|  3.50475e-05|  1.75238e-05|  0.00%|import platform      4|         1|  2.19345e-05|  2.19345e-05|  0.00%|from
24%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
The routing and addressing problem is nothing new in the IPv4 world. Version 6 of the Internet Protocol (IP), which is no spring chicken itself
24%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
--instance-type m6in.2xlarge --count 2 --output text Table 1 Network Performance Factors* Enhanced networking [4]   SR-IOV [5] and better hardware Elastic network adapter
24%
Arch Linux, packaged in style
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © kaewkanya sompong, 123RF.com
expect, the text-based installer of Arch Linux is not there to greet you when trying to install the system. Instead, the installer framework Calamares (Figure 1) is used in the current version 2.4
24%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
executes the payload and a TCP session is created, connecting back to the listener. 2. Read a 4-byte length, indicating the .dll size and then transfer the .dll. 3. Allocate a (length-byte+5) buffer; mark
24%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
take both a host-based and network-based approach. The suite uses three tools for host-based intrusion detection: (1) Wazuh [3] is a fork of the OSSEC [4] intrusion detection system; it monitors hosts
24%
Open MPI
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
, and available man pages, respectively." puts stderr "" puts stderr "This was built using the default gnu compilers for Scientific" puts stderr "Linux 6.2. That is, gcc-4.4.6-3." puts stderr "" puts

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice