Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 183 Next »

13%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
the executable, will open a meterpreter shell on the victim’s Windows box (see Figure 3). Figure 3: msfcli multi/handler options (above) and executing the listener
13%
Rethinking RAID (on Linux)
16.03.2021
Home »  HPC  »  Articles  » 
=libaio, iodepth=32 fio-3.12 Starting 1 process Jobs: 1 (f=1): [w(1)][100.0%][w=1420KiB/s][w=355 IOPS][eta 00m:00s] test: (groupid=0, jobs=1): err= 0: pid=3377: Sat Jan  9 15:31:04 2021   write: IOPS=352, BW=1410Ki
13%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
dynamically by Windows depending on the utilization level [3]. WSL is still in its early stages, but Microsoft is actively developing the project and adding additional features, such as GUI support for a fully
13%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
to reduce the zoom, use the m key to "minimize" (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts with the plus (+ ) key. Likewise, you can
13%
Successful protocol analysis in modern network structures
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © konstantynov, 123RF.com
networks are established on the existing Layer 3 infrastructures. VXLAN technology is all about assigning IP addresses in a larger network array and keeping IP addresses in case of location changes. From
13%
Manage resources with AWS CloudFormation
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © krisckam, 123RF.com
of resources, you only need to create a new stack that uses this sample template. The parameters shown in Listing 3 are used in the template to specify the values used in the properties of the Amazon RDS
13%
Veeam Agent for Linux backup software
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
to occur every night of the week at 3:00am. This involved backing up an entire Ubuntu installation in a bootable image on network-attached storage (NAS) in the local network (Figure 3). When backing up
13%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
to analyze, such as these four pickle files that have been created via fsscan.py . home1.pickle home2.pickle home3.pickle data.pickle The code mdpostp reads and process each of the files in turn
13%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
an exciting product, but Eucalyptus, whose APIs are built on Amazon EC2 (and soon, EC3), is more mature. Indeed, Eucalyptus tools are used by OpenStack as well. Trying to decide when, or if, Ubuntu Enterprise
13%
Tuning ZFS for Speed on Linux
17.03.2020
Home »  HPC  »  Articles  » 
       64 6836191232 sde    8       48 6836191232 sdd    8       80 6836191232 sdf Make sure to load the ZFS modules, $ sudo modprobe zfs and verify that they are loaded: $ lsmod|grep zfs zfs                  3039232  3

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice