Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 75 Next »

16%
Secure Alternative to FTP
23.07.2013
Home »  Articles  » 
 
Security concerns related to FTP were one factor that produced a series of developments leading to the Secure FTP, Secure Copy Protocol (SCP), FTP over SSL (FTPS), and SSH File Transfer Protocol
16%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
and shows a resulting graph in the right frame. If multiple metrics have a similar range of values, you can superimpose graphs. In all other cases, use the Dashboard button, which leads to an area in which
16%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
this climate computer concept design, which researchers have named “Green Flash” after the atmospheric phenomenon, I contacted lead researchers Michael Wehner and John Shalf. AA: In your paper, you describe
16%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
vulnerabilities; however, several of the leading Intrusion Detection/Protection systems are capable of alerting the network owner when a scan is in process. Rather than scanning for an open port, a devious
16%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
graph in the right frame. If multiple metrics have a similar range of values, you can superimpose graphs. In all other cases, use the Dashboard button, which leads to an area in which you can arrange
16%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
with the command: PS> doskey.exe /macros > Redirecting execution to Linux can lead to persistence over patched binaries. In a scenario of this type with SSH redirection, Windows uses OpenSSH. The required
16%
News for Admins
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
 
important, Dice says, as 60 percent of respondents said "100% remote" was their most desired workplace setting compared to 53 percent in 2021. Frontier Supercomputer Retains Lead on TOP500 List The Frontier
16%
Exchange Online migration with the Hybrid Agent
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Natee Srisuk, 123RF.com
. The agent communicates with Azure Application Proxy, an Azure proxy service with a client-specific endpoint that leads to your online environment. Availability information and mailbox migrations are managed
16%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
-running this benchmark on a quiet PC without any interferences from other programs. Very short execution times will lead to warnings requesting a better test and will likely inflate the execution count: Try hyperfine 'ls
16%
Python's change in leadership
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
and journalist covering Linux and open source for more than 10 years. He is also a science fiction writer whose stories have been broadcast on Indian radio and published in leading Indian magazines. He founded

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice