Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 000 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (164)
  • Article (52)
  • News (12)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 23 Next »

30%
Protecting Samba file servers in heterogeneous environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by rawpixel on Unsplash
Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 0.0.0.0:ssh 0.0.0.0:* LISTEN tcp6 0 0 [::]:ssh
29%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
         State       PID/Program name tcp        0      0 0.0.0.0:8009            0.0.0.0:*               LISTEN      -                tcp        0      0 0.0.0.0:139             0.0.0.0:*               LISTEN
29%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
% 0 0.0KB/s 00:00 To copy a file from a remote system, change the syntax slightly: scp bob@calypso:/opt/test/file.txt . The trailing dot means the copy is to the current directory
29%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:net_conf_t:s0 nametype=NORMAL type=CWD msg=audit(1404225360.791:124138): cwd="/home/tscherf" type=SYSCALL msg=audit(1404225360.791:124138): arch=c000003
29%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
tottime percall cumtime percall filename:lineno(function) 148/1 0.001 0.000 156.745 156.745 {built-in method builtins.exec} 1 149.964 149.964 156.745 156.745 md_002.py:3
29%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
-r--r-- 2 root root 6 3. Feb 18:36 .glusterfs/0d/19/0d19fa3e-5413-4f6e-abfa-1f344b687ba7 # # ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e3-42ba-b2cb-22ff8de3edf0 .glusterfs /00/00/00000000-0000-0000-0000
29%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
=’none’/>
0000’ bus=’0x00’ slot=’0x05’function=’0x0’/> This kind of VM can easily
29%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
, password = "Secret", user = user 0.000u 0.000s 0:39.71 0.0% 0+0k 0+0io 0pf+0w or # hdparm --user-master u --security-erase-enhanced "Secret" /dev/sdb In both cases, not only is the delete process
29%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
sprzblog mysql ↩ limesurvey -uroot -ppassword > ↩ backup.sql will take 21 seconds to complete: real 0m21.626s user 0m0.000s sys 0m0.000s In the case of larger databases on non
29%
open64
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
| 4.3 MB 00:02 (2/2): nss-softokn-freebl-3.12.9-11.el6.i686.rpm | 115 kB 00:00

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 23 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice