Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 08 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (591)
  • Article (136)
  • News (9)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 74 Next »

17%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
-persistent-net-generator.rules openSUSE, Red Hat 6 * /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
17%
TKperf – Customized performance testing for SSDs and HDDs
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Orcea David, 123RF
are also available; they will be expanded in future versions of TKperf. Fio and Python In the background, TKperf uses the Flexible I/O Tester (Fio) [3] developed by Jens Axboe, the maintainer of the Linux
17%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
traffic normally unavailable because of layer 2 switching. Arpspoof [3] is much simpler than ettercap for redirecting packets: # arpspoof -i eth0 -t host Specifying the interface is optional
17%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
key first, as per the requirements of the official SSH transport standard (RFC 4253) [3]. The listings differ depending on whether or not you know the fingerprint for the other party's public key
17%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
the net start command to get a list of services running (Figure 3): >net start Figure 3: Output from the net start command. Several services
17%
Innovations in PowerShell 5
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Zarko Cvijovic, 123RF.com
and Using Classes 01 class NetConfig 02 { 03 #Properties 04 [STRING]$ComputerName = "srv01"; 05 [STRING]$IpAddress = "192.168.178.2"; 06 [STRING]$DNS = "192.168.178.1"; 07 #Methods 08 09 [Void] 10
17%
News for Admins
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
 
by CISA, NSA, and NIST. The Quantum-Readiness: Migration to Post-Quantum Cryptography (PQC) (https://www.cisa.gov/sites/default/files/2023-08/Quantum%20Readiness_Final_CLEAR_508c%20%283%29.pdf) fact sheet
17%
Data Security vs. Data Protection
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Andrea Danti, 123RF.com
in the future. To remain as free as possible from damage, the European Union's GDPR requires the preparation of a Data Protection Impact Assessment (DPIA). According to Article 35 of the GDPR [3], a DPIA
17%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
Networks Breached Citrix, a software giant that offers a wide range of products and services, admitted that its networks were breached (https://www.citrix.com/blogs/2019/03/08/citrix
17%
End of life for Windows Server 2003
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Antonella Grandoni, Fotolia.com
on your systems. Migrating Individual Server Roles Microsoft provides a few manuals for migrating server roles [3] that are designed to make it easier for admins to port server roles to newer operating

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 74 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice