Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 134 Next »

26%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
. Immediately after posting a sample, Cuckoo outputs appropriate messages on the console (Listing 3). Listing 3 Cuckoo Output 2016-07-25 17:37:00,192 [lib.cuckoo.core.scheduler] INFO: Starting
26%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
are generating a test installation only. While the installation process is running, the Ubuntu host needs additional resources. Even though only 3GB of RAM and two processor cores are required, the installation
26%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
for the gaming industry, such as Kognitio [3], are based on Hadoop. Game chips, customer loyalty cards, and even liquor bottles in bars like Aria Hotel and Casino are equipped with RFID tags. This technology
26%
New ITIL framework and certification
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Dioptria, sxc.hu
, which roughly maps the Service Value Chain from ITIL 3, and the Four Dimensions Model. ITIL also defines a number of guiding principles that have to be observed across the board, some of which are found
26%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
depends first and foremost on keeping the key a secret (Kerckhoffs’s principle) Ð but why give the attacker a head start by revealing other clues, such as the cryptographic encryption algorithms? Without
26%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
. The iperf3 tool defaults to uploads from client to server, but the reverse is also possible (-R option) for bi-directional testing. Launch the server first: $ iperf3 -s ------------------------- Server
26%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
Apr 14 11:00 /boot/initramfs-3.10.0-957.el7.x86_64.img Troubleshooting the Shell If the system does not boot as usual and access to the root volume is not possible, dracut provides a shell
26%
AlmaLinux and HPC
31.01.2024
Home »  HPC  »  Articles  » 
Information Process Standard (FIPS) 140-3 validation, which means AlmaLinux 9 is using approved algorithms for encryption, hashing, assigning, and so on. AlmaLinux’s move to ABI compatibility has freed it from
26%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type 3
26%
What Is an Inode?
23.03.2022
Home »  HPC  »  Articles  » 
: It’s just the data about the data (i.e., metadata), such as the file and group owner, permissions, and several file timestamps. Some filesystems (e.g., ext3 and ext4) create all the inodes at the time

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice