Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (541)
  • Article (183)
  • News (126)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 86 Next »

17%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
.0.0.0/0 multiport dports 22 Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain f2b-default (1 references
17%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
130,000 university staff and students and operates the Munich Scientific Network with around 110,000 devices. To manage the mass of passwords for servers and services operated at the LRZ
17%
Caching with CacheFS
07.07.2020
Home »  HPC  »  Articles  » 
command is: $ time cp /mnt/data/Downloads/octave-5.1.0.tar.gz /tmp   real    0m46.298s user    0m0.000s sys     0m0.034s Don’t worry about the performance of the transfer. After the transfer, take a look
17%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
c -c rpitesting -Ovq localhost NET-SNMP-EXTEND-MIB::nsExtendOutputFull.\"rpitemp\" The result is the current temperature, multiplied by 1,000 so it can be processed as an integer. This works because
17%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
_file | ACTIVE | +--------------+---------------+ 1 row in set (0.00 sec) Finally, confirm data encryption at rest with the strings command to view the encrypted output: $ strings /var
17%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
parameters, and it can provide potential attackers a vector for an attack or monitoring. To increase the security, access was restricted to just 30 parameters – compared with the 3,000 parameters that sysctl
17%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
be manipulated retrospectively, which would make technologies such as blockchain superfluous, at least in part. Around 1,000 voxels per level are bundled into a square field that, with all of its levels
17%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
130,000 university staff and students and operates the Munich Scientific Network with around 110,000 devices. To manage the mass of passwords for servers and services operated at the LRZ
17%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
to the screen (STDOUT; line 15). Listing 1: SSH Script 01 #!/usr/bin/php 02 22); 05 ssh2_auth_password($ssh, 'khess', 'password'); 06 $stream = ssh2_exec
17%
Whitepaper: AMD “Bulldozer” Architecture
10.11.2011
Home »  HPC  »  Vendors  »  AMD  » 
 
6200 Series processors. SVR-16    2Based on testing in AMD Performance Labs as of August, 2011, an AMD Opteron™ processor model 6174 (12-core 2.2GHz) consumes 11.7W in the active idle C1E power state

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 86 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice