Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (438)
  • Article (147)
  • News (16)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 Next »

17%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
using GNU’s autoconfigure before: ./configure --with-ssh --without-rsh make make install These three lines put the binaries into /usr/local/ , which is fine for testing purposes. For production work, I
17%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
not have enough performance to make it interesting to me. Figure 1: My early Cluster HAT. Starting with the Raspberry Pi 3, the CPU was now 64 bits
17%
Creating SmartOS zones using UCARP
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Le Moal Olivier, 123RF.com
storage (DS3), Lucene, MongoDB, Riak, REST, SaaS, and so on. Additionally, you have to forget the old-fashioned IP address bound to a specific service or welded to a specific machine providing a particular
17%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
to Virtualization.'' Alternatives to Virtualization According to one very nicely written page [3], KVM will still work without the hardware extensions, but it will be much slower. It is also possible
17%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
_64 3/4 19 Verifying : bzip2-1.0.6-13.el7.x86_64 4/4 20 21 Installed: 22 mssql-server.x86_64 0:14.0.3026.27-2 23 24 Dependency
17%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
and system owners, which makes it easy to provide protection against exploits. Brute force attacks on SSH servers, the lack of encryption in communications, and distributed denial of service (DDoS
17%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
, the Virtual Machine Manager can create a snapshot, which appropriate tools then take apart [2] [3]. A bare metal Linux presents forensic experts with greater challenges: Every change to the system also changes
17%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
17%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
of only 56 bits. The 1990s, when SSLv2 was being developed, were the hot phase of the "Crypto Wars." Strong encryption technologies were forbidden in the United States. Many states talked about only
17%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.S. National Institute of Standards and Technology (NIST). According to the guide

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice