Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (721)
  • Article (195)
  • News (14)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 94 Next »

16%
Rocky Linux RC 1 Now Available
04.05.2021
Home »  News  » 
 
:1 binary replacement for Red Hat Enterprise Linux and currently ships with GNOME 3.32, kernel 4.18.0-240.22.1.el8, SQLite 3.26, virt-what 1.18, samba 4.12.3, dnf 4.2, rpm 4.14, glibc 2.28, libgcc 8
16%
Updating Docker containers with Watchtower
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Alan on Unsplash
. If you have a piece of software that is version 3.8.12, you might see version 4.0.1 start up as an updated image, which might not always be what you want. If the software you use supports extensions
16%
News for Admins
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
 
.eu/one-step-closer-exascale-eurohpc-ju-and-forschungszentrum-julich-sign-hosting-agreement-exascale-2022-12-14_en) between the European High Performance Computing Joint Undertaking (EuroHPC JU
16%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
. If the edgeLinux partitioner does not give you a suggestion for partitioning the system disk, proceed as follows: Create a 1024MB partition for /boot and a 20GB partition for /. Leave the remaining space
16%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
16%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
\ 02 --hostname=foo.bar.de --mac- address=00:40:26:CA:10:DD \ 03 --kopts="stage=test app=www" --ksmeta="stage=test app=www" 04 # cobbler system edit --name=foo --interface=eth0 --mac=00:40:26:CA
16%
News for Admins
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
 
release to the encryption toolkit to address a "certificate forgery" issue. The problem affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o. According to the security advisory (CVE-2015
16%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
unsigned int flags = 0; 066 067 printf("deadline thread start %ld\n", 068 gettid()); 069 070 attr.size = sizeof(attr); 071 attr.sched_flags = 0; 072 attr.sched_nice = 0; 073 attr
16%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
.g., Wireshark). Despite this failing, VLANs are considered safer than normal networks. In truth, a network is also based on a VLAN where all nodes on the network work with a VLAN ID of 0. Multivendor VLANs
16%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
565b5901d666de3bfe538be27aebb9f443de98f0 notification_proxy: use free() instead of g_free() 10 5c10f12e408b11afbd7c3cc93ddf7d85f1527417 ideviceinfo: fix possible segmentation fault when parsing empty

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 94 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice