Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (824)
  • Article (227)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 106 Next »

15%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
opening the file compromises the computer. The spread of malware or crimeware has not slowed down – on the contrary. Back in the early 1990s, the first tools that greatly facilitated the process ... Attacks on Microsoft Office files are increasing. A multilayered approach is your best protection against this malware. ... Protect yourself from infected MS Office files
15%
Desktops and applications with Essentials
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © krisckam, 123RF.com
, as well. XenDesktop Essentials exclusively supports virtual desktops with Windows 10. The on-premises installation of XenDesktop also supports Windows 7.8 and 8.1, as well as virtual desktops with Linux
15%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
/run/systemd/resolve/resolv.conf /etc/resolv.conf mkdir /etc/systemd/network Listings 2 and 3 show the two configuration files for the regular Ethernet card (Listing 2) and bridge device (Listing 3
15%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
in the Metasploit Framework itself. Start the Metasploit msfconsole console and load nessus : msf > load nessus Once the plugins are loaded, connect to the server. msf > nessus_connect cr0wn:password@localhost ok
15%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
[1] [2]. This type of malware is virtually undetectable without analyzing volatile memory. Much of the industry focus has been on developing memory analysis techniques for Windows operating systems
15%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
the configuration file /etc/sysctl.d/10-rootless-podman.conf, decreasing the lowest port unprivileged processes can listen on to 80: net.ipv4.ip_unprivileged_port_start=80 Then load the new kernel parameters ... Running rootless containers is easy with Podman. With Podman Quadlet files, these containers are seamlessly integrated into systemd services.
15%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
. You can download the header file from the Khronos website [10]. Getting Started To demonstrate OpenCL in action, I will start with a simple example to solve a parallelizable problem with Open
15%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
NIST has chosen the Keccak algorithm as the new cryptographic hash standard but, in real life, many users are still waiting to move to its predecessor SHA-2. ... and minutely investigated. But Schneier’s words fell on stony ground. On October 2, NIST announced the winner: Keccak, a development by a Belgian team of scientists, is to become the new SHA-3 standard. For co ... NIST has chosen the Keccak algorithm as the new cryptographic hash standard, but in real life, many users are still waiting to move to its predecessor, SHA-2.
15%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
access is aligned to internal sector size, so that should be your first consideration. Without further data, the rule of thumb adopted by Microsoft in Windows 7 of aligning to 1MB (2048x512 and 256x4096
15%
High-Performance Python 1
16.07.2019
Home »  HPC  »  Articles  » 
 helloworld.pyx /home/laytonjb/anaconda3/lib/python3.7/site-packages/Cython/Compiler/Main.py:367: FutureWarning: Cython directive 'language_level' not set, using 2 for now (Py2). This will change in a later release! File

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice