Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (440)
  • Article (129)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Next »

13%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
, but the backup mechanism always uses encryption, and the Hub handles key management. Backups can be saved in the Amazon S3 cloud service and are always available for download via the GeoIP tag to the nearest data
13%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
is important. Most existing tools (e.g., Darshan [1], Vampir [2], libiotrace [3]) are profilers that collect data during runtime and provide the collected data for later analysis. With the libiotrace
13%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
] Python [6] Julia (up and coming) [7] Java [8] Matlab [9] and Matlab-compatible tools (Octave [10], Scilab [11], etc.) Java is the lingua franca of MapReduce [12] and Hadoop
13%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
) [12], introduced in Kubernetes 1.6, that can be used with Prometheus. Name Tag Kubernetes uses namespaces to isolate the resources of individual users or a group of users from one another
13%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
will also use the secure or insecure variants of the SMTP, IMAP, and POP3 protocols. Email can also be encrypted and signed using PGP or S/MIME. Postmaster modules allow the admin to add an X-OTRS header
13%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
. The command > msfpayload windows/exec CMD="cmd /k calc" EXITFUNC=thread C | sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- would format the parameter value for -ShellCode correctly in the example here
13%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
the data that was gathered with this command: ossiot "mpirun –np 2 ./sweep3d.mpi" In Figure 6, I present an example of the event-by-event list view using the GUI, when the Event List EL icon is selected
13%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator and Mydigipass.com. Info [1] RSA Security [2] SafeNet [3] SMS Passcode (in German) [8] LSE LinOTP [9] Mobile-OTP [10] Mydigipass API [11] Demo token [12] Vasco [13] Mydigipass plugins
13%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
in source code, such as: var PASSWORD = 'sn4k3oil' This method tackles the challenge of keeping secret information synchronized between all team members in a simple, although not secure, way. On the one
13%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice