Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (451)
  • Article (136)
  • News (6)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 60 Next »

9%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
all the important options for cryptographic handling of email in the Security tab (Figure 5), which is where you can manage S/MIME certificates and encrypt the contents with OpenPGP. However, you have
9%
Where Does Job Output Go?
11.09.2023
Home »  HPC  »  Articles  » 
the application(s); and so on. When the job finishes or the time allowed is exceeded, the job stops and releases the resources. As resources change in the system (e.g., nodes become available), the resource
9%
What's new in Samba 4
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Natalia Sheinkin, 123RF.com
, you should see a socket named socket in the directory you specified and Samba listening on that socket: $ sudo ls -l /opt/s4/var/ntp/socket srwxrwxrwx 1 root root 0 Feb 12 14:42 /opt/s4/var
9%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
-Process cmdlet reports system process information in the format shown in Listing 1. Listing 1 Default Get-Process Format 01 Handles NPM(K) PM(K) WS(K) VM(M) CPU(s) Id ProcessName 02
9%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
as filter the many thousands of processes running on any particular Windows host. You can download Process Monitor directly from Microsoft [6]. Figure 1
9%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
such as firewalling, network address translation (NAT), or quality of service (QoS). For this, you still need to rely on the functionality of the underlying operating system or third-party systems. FRR's feature set
9%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
to intercept HTTP(S) requests from the browser to the site you are testing. As packets are intercepted, you can modify parameters, cookies, and other data, and you can filter packets within the proxy to include
9%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
Catcher in the Rye', 'J.D. Salinger', '1951-07-16', 15.99), ('To Kill a Mockingbird', 'Harper Lee', '1960-07-11', 12.99), ('Pride and Prejudice', 'Jane Austen', '1813-01-28', 9.99); At this point
9%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
over the color for the bars (Figure 6). Figure 6: Histogram of the groups of readers as determined by cluster analysis. Visualizing Multiple
9%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
type of suboptimal file I/O is inefficient file access patterns. Our script [6] can help with the problem of unnecessary frequent and small reads and writes of data inside a file. In this article, we

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice