Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (394)
  • Article (116)
  • News (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Next »

16%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
query that triggered it. Thanks to extensive logging capabilities, you can quickly find the root cause of any problem. In the case of the Koha library system, GreenSQL had difficulties with the set
16%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
, a team of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club's annual congress [5]. This attack allowed them to create a spoofed root certificate on an SSL certificate
16%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
for installation of certain Windows features. Listing a computer's group memberships. Entering DNS servers. I am using Windows 10 client with a Windows Server 2012 R2 domain, with PowerShell v5
16%
Inventory and manage your IT systems
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Edryc James P. Binoya on Unsplash
the install, you will find the files in the /usr/local/open-audit directory. The public sub-folder is used as the document root of the Apache web server. Note that I was unable to run the software on RHEL
16%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
, use In: np.arange(3, 10, 2) Out: array([3, 5, 7, 9]) to generate a sequence from 3 to 10 with a step size of 2. Basic Arithmetic Operations NumPy allows many operations applied against all elements
16%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
/Linux\r Ubuntu 10.04.4 LTS\r \r Welcome to the Ubuntu Server!\r * Documentation: http://www.ubuntu.com/server/doc\r \r System information as of Thu Oct 11 15:55:28 CDT 2012\r \r System load: 1
16%
Wireshark
27.11.2011
Home »  Articles  » 
 
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
16%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
Files are 10x bigger than in previous studies Files are rarely reopened: >66 percent are reopened just once and 95 percent are opened fewer than five times <1 percent of clients account for 50
16%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
16%
Automatic build and deploy with OpenShift and GitLab CI
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Photo by Jantine Doornbos on Unsplash
. For this tutorial, I use OpenShift Origin v3.6. For interested readers who don't have an OpenShift Origin cluster, you can instead use Minishift [10], a tool that runs a single-node OpenShift cluster locally inside

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice