Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (382)
  • Article (156)
  • News (13)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 Next »

17%
Combining Directories on a Single Mountpoint
19.05.2014
Home »  HPC  »  Articles  » 
, eight with HyperThreading, running at 3.5GHz) 32GB of memory (DDR3-1600) GigE NIC Simple GigE switch CentOS 6.5 (updates current as of March 29, 2014) The test system that mounts
17%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
, 3DNow). You can verify the existence of a CPU with VT extensions after the installation of Proxmox VE by typing pveversion-v at the Proxmox console. If you have the 2.6.24 kernel, the output should
17%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
with the letters DAL , issue the command (in Cygwin): bash-3.2$ net view | grep -i DAL \\DAL01 \\DAL02 \\DALAUTO \\DALV01 The only thing you have to remember when dealing with Windows systems in Cygwin’s Bash
17%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
number 2 using 38.698MW, resulting in a low performance/power ratio of 26.15. In comparison, Frontier at number 1 reached about 1.2 exaflops using 22.78MW, resulting in a performance/power ratio of 52
17%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
are synchronized. For example, for a new sales campaign, you can easily add staff from one campaign who are already members of a team as members of the new team: Get-AzureADGroupMember -ObjectId e45712da-4a52-422c
17%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles. Big Deal? AWS IAM [3] lets you manage access to AWS
17%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
they are checked. The use of analysis tools such as Mimikatz [3] to grab valid login or session data through the Local Security Authority Subsystem Service (LSASS) are restricted with the rule 9E6C4E1F-7D60-472F
17%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
17%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
tool. Enter GlusterFS (Figures 3 and 4). Red Hat acquired Gluster late in 2011 and assimilated its only product, GlusterFS. Shortly after, Red Hat revamped many parts of the project, added release
17%
Getting a free TLS certificate from Let's Encrypt
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Stuart Miles, 123RF.com
echo " certificates exist, but apparently are very fresh, do not get new ones" 50 sleep 3 51 # notify and exit this loop iteration, continuing with the next 52

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice