Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (525)
  • Article (144)
  • News (16)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 69 Next »

18%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
1 05 set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive
18%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
Laplace equation using Jacobi iteration method 003 ! Kadin Tseng, Boston University, November 1999 004 ! 005 MODULE jacobi_module 006 IMPLICIT NONE 007 INTEGER, PARAMETER :: real4 = selected_real_kind(6
18%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
python-pubsub/samples/snippets python3 publisher.py demo create demo python3 subscriber.py demo create demo demo python3 publisher.py demo publish demo python3 subscriber.py demo receive demo 20 echo
18%
Prowling AWS
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Dmitry Naumov, 123RF.com
. For some additional context, sections on the AWS Security Blog [3] are worth digging into further. To bring more to the party, the sophisticated Prowler also stealthily prowls for issues in compliance
18%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
they are checked. The use of analysis tools such as Mimikatz [3] to grab valid login or session data through the Local Security Authority Subsystem Service (LSASS) are restricted with the rule 9E6C4E1F-7D60-472F
18%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
combinations are supported: ShadowProtect 4.0.1: Oracle VirtualBox 3.1.0--3.2.6 ShadowProtect 4.0.5: Oracle VirtualBox 3.1.0--3.2.12 ShadowProtect 4.1: Oracle VirtualBox 3.1.0--4.0.4 Shadow
18%
Get Started with Parallel CPython
07.11.2011
Home »  HPC  »  Articles  » 
Python code designed with threading is to use the built-in multiprocessing package included in Python from version 2.6 on. This package provides an API similar to the threading Python module. Although
18%
Sharing a Linux Terminal Over the Web
08.08.2022
Home »  HPC  »  Articles  » 
 because, typically, head nodes or workstations open ports 22 (SSH), 443 (HTTPS), and sometimes 80 or 8080 (HTTP). Can I find terminal-sharing tools that use these ports? Moreover, can a web browser be used for terminal
18%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
the data across all nodes: cockroach start --insecure --join=,,3> This ensures that the previously stopped node receives any updates that occurred during
18%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 69 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice