Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: hooker俱乐部客服联系dv9500.comhhpoker俱乐部客服联系dv9500.comhhpoker俱乐部客服联系dv9500.comhhpoker俱乐部客服联系dv9500.comp ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (36)
  • Article (18)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 Next »

59%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
2,500 GitHub Stars. New features are released quite frequently; according to the GitHub page, an update is made approximately every two weeks. The tool integrates with a wide range of existing
59%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
on RAID systems in the background. Linux as a High-Performance Operating System Computer experts, or in fact anybody who is interested in doing so, can check out the biannual top 500 list to discover
58%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
or exclude similar packets (Figure 4). Figure 4: Including and excluding requests to given hosts and IP addresses. The Spider tab allows
58%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
containers (Figure 3) – that is, completely virtualized operating systems – and application containers (Figure 4) for virtualizing a particular application, including its run-time environment. However, LXC
58%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
.py  CPU ALL:  1.0  %  CPU0    4.1%  CPU1    2.0%  CPU2    0.0%  CPU3    0.0%  CPU4    0.0%  CPU5    0.0%  CPU6    0.0%  CPU7    2.0%  CPU ALL:    user:      0.7%  nice:    0.0%    system:    0.2%  idle
58%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
$74.99 $74.99 1600MHz dual-channel memory 4x4GB = 16GB total memory 2 $49.99 $99.98 ZION XON-720P mATX/ITX slim desktop case 300W power supply
57%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
You Need" box). The current version, the Raspberry Pi Model B+ [4] (Figure 1), continues a history of iterative improvements. What You Need Keep in mind that once you have a Rasp Pi B+, you
57%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
tokens globally, suggesting, that the algorithm and the seeds used to calculate the one-time passwords were stolen. SafeNet [4] is an American manufacturer of security solutions that acquired Aladdin
57%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
and organizations on which they work. Two of the more popular models include: The Cyber Kill Chain copyrighted by Lockheed Martin [4]. The Mitre ATT&CK model [5]. Just as a good hiker uses different
57%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
to earlier articles in this magazine [2]–[4].) Many users still think that VMs in the cloud are always publicly available. However, administrators who have been involved with virtual network infrastructures

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice