Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (439)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 61 Next »

16%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory
16%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
4 Low drop AF11 = 10 (001010) AF21 = 18 (010010) AF31 = 26 (011010) AF41 = 34 (100010) Medium drop AF12 = 12 (001100) AF22 = 20 (010100
16%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
:/path/to/socket A reference to all mod_ssl-provided directives is available for Apache 2.2 [6] and Apache 2.4 [7]. Once you have created a certificate, setting up mod_ssl is no problem, but SSL/TLS only encrypt traffic
16%
High-Performance Python 1
16.07.2019
Home »  HPC  »  Articles  » 
a “wrapper function” for the library in Python (Listing 6). Listing 6: Wrapper Function import ctypes   _sum = ctypes.CDLL('libsum.so') _sum.sum_function
16%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
from systems such as the IIS, Microsoft Exchange ActiveSync, Exchange Web Services (EWS), or Outlook Web Access (OWA). Installation under .NET .NET Framework 4.x and Log Parser 2.2 [2] form the basis
16%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
: $ curl http://169.254.169.254/openstack 2012-08-10 2013-04-04 2013-10-17 2015-10-15 2016-06-30 2016-10-06 2017-02-22 To retrieve a list of supported versions for the EC2-compatible metadata API, enter
16%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
# Jenkins home directory is a volume, so configuration and build history 22 # can be persisted and survive image upgrades 23 VOLUME ${JENKINS_HOME} 24 USER ${JENKINS_USER} 25 26 ARG JENKINS
16%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
): 6 partitions 130494 total reads 1796014 merged reads 15370134 read sectors 1467900 milli reading 211902 writes 1267923 merged writes 11997432 written sectors
16%
Mesos compute cluster for data centers
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Artisticco LLC, 123RF.com
prominent enterprises have adopted Mesos. Mesos depends on a system of well documented APIs [6] that support programming in C, C++, Java, Go, or Python. As a scheduler, Mesos provides the underpinnings
16%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
variant will do; it does not have to come from the official Microsoft Store  [6]. Alternatively, the attacker can create their own Linux derivative for WSL with known threats and tools. The command PS

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 61 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice