Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 93 Next »

24%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
because the actual software stack typically varies from cluster to cluster. Thus, a vendor will often suggest other software and hardware as the root of a problem – and vice versa from other hardware
24%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
for the present Typo3 instance simply by evaluating the HTTP header order of the Typo3 back end (Table 1). The root cause of this error is that Typo3 separates
24%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
: Nmap Command root@sandbox:~# nmap -v -A www.haribo.de ... Host www2.haribo.com (213.185.81.67) is up (0.011s latency). Interesting ports on www2.haribo.com (213.185.81.67): Not shown: 995 closed ports
24%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
the head node to the compute nodes. The nodes are all connected by Gigabit Ethernet. In the previous articles I added a root password for the container and configured Network Time Protocol
24%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
. PowerShell: The PowerShell command is: New-PsDrive -name m -Root \\SRV\DOCS \ -PsProvider FileSystem -persist PowerShell uses the cmdlet command type. Simplified, cmdlets can be understood
24%
News for Admins
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
 
percent of security rules. Seventy-six percent of organizations don't enforce multi-factor authentication (MFA) for console users, while 58 percent don't enforce MFA for root/admin users. Sensitive
24%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
to various tactics, techniques, and procedures (TTPs). TTP 1: Tools Attackers bypass the requirement to enter a sudo password by passing the -u root argument to wsl.exe, making it far easier to download
24%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
.amazon.com/premiumsupport/knowledge-center/enable-configure-enhanced-networking/ Overview of SR-IOV: https://learn.microsoft.com/en-us/windows-hardware/drivers/network/overview-of-single-root-i-o-virtualization--sr-iov- Instance types by network performance: https
24%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
adds the highest available certificate in the specified certificate chain to the list of signature providers and is usually located directly below the root certificate, because verification does
24%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
to enter the passphrases manually, which is inconvenient. For example, if the root volume of a computer is encrypted, the system does not start until one of the previously defined passphrases has been

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice