Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (538)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 75 Next »

16%
Hyper-V 3.0 in Windows Server 2012
12.11.2012
Home »  Articles  » 
 
to the network adapter, among other things. Single-Root I/O Virtualization (SR-IOV) is also new in Hyper-V. Under this specification, Hyper-V can also use hardware features of network adapters. To this end
16%
Moving Your Data – It’s Not Always Pleasant
08.05.2013
Home »  HPC  »  Articles  » 
of cores is to run multiple cp commands at the same time, either on specific files or specific subtrees (start at the lowest branch and work upward to root). This isn’t too difficult to script if you have
16%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
because the actual software stack typically varies from cluster to cluster. Thus, a vendor will often suggest other software and hardware as the root of a problem – and vice versa from other hardware
16%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
for the present Typo3 instance simply by evaluating the HTTP header order of the Typo3 back end (Table 1). The root cause of this error is that Typo3 separates
16%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
: Nmap Command root@sandbox:~# nmap -v -A www.haribo.de ... Host www2.haribo.com (213.185.81.67) is up (0.011s latency). Interesting ports on www2.haribo.com (213.185.81.67): Not shown: 995 closed ports
16%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club’s annual congress. This attack allowed them to create a spoofed root certificate on an SSL certificate authority
16%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
the head node to the compute nodes. The nodes are all connected by Gigabit Ethernet. In the previous articles I added a root password for the container and configured Network Time Protocol
16%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
. PowerShell: The PowerShell command is: New-PsDrive -name m -Root \\SRV\DOCS \ -PsProvider FileSystem -persist PowerShell uses the cmdlet command type. Simplified, cmdlets can be understood
16%
News for Admins
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
 
percent of security rules. Seventy-six percent of organizations don't enforce multi-factor authentication (MFA) for console users, while 58 percent don't enforce MFA for root/admin users. Sensitive
16%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
to various tactics, techniques, and procedures (TTPs). TTP 1: Tools Attackers bypass the requirement to enter a sudo password by passing the -u root argument to wsl.exe, making it far easier to download

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice