Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (435)
  • Article (186)
  • News (50)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 68 Next »

34%
Yet Another Botnet is Targeting Linux
22.02.2021
Home »  News  » 
 
exploits, targeting 32 vulnerabilities in open source software, such as Drupal, Elasticsearch, Apache Hadoop, Redis, and the ThinkPHP framework. Unit 42 estimates around 500 to 1,000 infected systems
34%
DOE Announces Graduate Research Grants
01.03.2024
Home »  HPC  »  News  » 
 
The US Department of Energy’s (DOE) Office of Science has announced that it is accepting applications for the Science Graduate Student Research Program (SCGSR). Applications are due at 5:00pm EST
34%
Datadog Report Examines DevSecOps Best Practices
09.05.2024
Home »  News  » 
 
image is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100 MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500
34%
Aurora Exascale Supercomputer Officially Deployed for Research
06.02.2025
Home »  News  » 
 
. The system, which ranks third on the latest TOP500 list, was built in partnership with Intel and Hewlett Packard Enterprise. The projects running on Aurora represent some of the most ambitious and innovative
34%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
to specify your Shodan key: $ sudo nmap -sn -Pn -n --script shodan-api --script-args shodan-api.apikey= UsYM89GnfM86IP5aodgbTf6voFQL7kae www.foocompany1.com In a moment, I'll show you how to get your own
34%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
through the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework [3]. SQLmap supports any popular database system, such as My
34%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
. Some reference tables can be synchronized with multiple regions. With a replication factor (RF)=3 across three data centers or availability zones, the database can be used even if one of the data centers
34%
GNU Parallel: Multicore at the Command Line with GNU Parallel
04.11.2011
Home »  HPC  »  Articles  » 
Recent trends in computing are toward more cores doing more tasks at once. These days, you are likely to have a dual- or quad-core CPU in your laptop, and perhaps 4, 6, 12, or 16 cores in your
34%
Creating Active Directory reports using free tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © reddz, 123RF.com
: gplogview.exe -a a9034339-85ce-4ab6-9444-b14c33a93e89 \ -o \\dell\x\%computername%-GPEvents.txt You can also hide irrelevant data in the results files using the -n option: gplogview.exe -n -o \\dell
34%
Green IT
24.10.2011
Home »  Articles  » 
 
) and about 6 million Euros (large corporation). The total period of the study was divided into segments of three years each, because this reflects both the typical warranty period and the typical write

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice