Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (498)
  • Article (140)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 66 Next »

11%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
the modules and their Gluster-integration on the OpenStack website http://6. Thanks to all these features, Gluster acts as a storage jack-of-all-trades for OpenStack with direct access to the major components
11%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
$4dIrCZLpgSYDClrS6pN2BOxVm.rkPy/4IgnurlHbukOxOJldlhJM." 12 acl: 13 - match: {account: "admin"} 14 actions: ["*"] 15 comment: "Admin has full access to everything." 16 - match
11%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
the Swagger tools in the build process; the documentation and client SDK are automatically kept up to date. Swagger, developed by SmartBear [6], comprises in part a comprehensive specification [2
11%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
as shown in the following listing. Apache/2.2.16 (Debian) DAV/2 SVN/1.6.12 mod_fcgid/2.3.6 Phusion_Passenger/3.0.11 mod_ssl/2.2.16 OpenSSL/0.9.8o Server at www.domain.tld Port 80 Treacherous Error Messages
11%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
shown in Figure 4. Figure 4: Header bytes 12-15. Looking at byte 13, if SYN and ACK are set, then your binary value would be 00010010 , which
11%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, use the winenum script and the scraper script. The winenum script will dump tokens and hashes, providing you with lots of information (see Figure 6). The scraper script will pull down the registry
11%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
will see a screen like that shown in Figure 6. Notice that a small window opens just above the process table listing CPU usage, memory usage, the user, and more about that process
11%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
the graphical interface or with text files in JSON format [6] stored in the /etc/cockpit/machines.d/ directory. A configuration file would resemble Listing 1: "address" can be either the IP address or the DNS
11%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
: 6 08 microcode : 0x60c 09 cpu MHz : 800.000 10 cache size : 6144 KB 11 physical id : 0 12 siblings : 2 13 core id : 0 14 cpu cores : 2 15 apicid
11%
Use PowerShell to manage Exchange Online
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © reddogs, 123RF.com
a separate installation package on GitHub. On macOS machines, you need at least macOS 10.12. Additionally, PowerShell Core 6.x can also run in Docker containers and on the Kali Linux security distribution

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice