Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (440)
  • Article (129)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 58 Next »

13%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -sL option (nmap -sL) performs
13%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
$spin 08 @$molecule.xyz 09 10 END 11 12 done 13 done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
13%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
by Datapoint, but it wasn’t until the early 1980s that DEC had some initial commercial success with its VAX cluster. The Linux operating system made a decisive contribution to reducing the costs
13%
Multicore Processing in Python
22.08.2017
Home »  HPC  »  Articles  » 
MP portion of the code is working. Listing 3: Output of hw Python Module [laytonjb@laytonjb-Lenovo-G50-45 F2PY]$ python Python 2.7.12 |Anaconda custom (64-bit)| (default, Jul 2 2016, 17:42:40) [GCC 4
13%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
-Manage: novammanage user admin rwartala This process creates an access key and a security key: export EC2_ACCESS_KEY=713211a477a154470fUU ae543346b52e30a0e export EC2_SECRET_KEY=244de6a188aa344e12UU 9521003ac756abbdf
13%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
] command ... -S return largest of remote command return values -h output usage menu and quit -V output version information and quit -q list
13%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.168.56.103:3306:1 Incoming address: 127.0.0.1:3306 , control FIFO: /tmp/glbd.fifo Control address: 127.0.0.1:4444 Number of threads: 6, source tracking: OFF, verbose: OFF, daemon: YES Destinations: 3 0
13%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
AMD64 and ARM64 HTTP Boot support in Debian Installer and Live images for UEFI/U-Boot systems Upgraded software stack: Gnome 48, KDE Plasma 6, Linux kernel 6.12 LTS, GCC 14.2, Python 3
13%
LDAP integration with popular groupware suites
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Sergey Tryapitsyn, 123RF.com
Open-Xchange Scalix Tine 2.0 Zarafa Zimbra Product version 14.1 3.4 7.6 12.5 Coriander, 2014.09.10 7.1 8.6 Supported
13%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice