Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1184)
  • Article (265)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 150 Next »

20%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
Creating volume "mutillidae-docker_ldap_config" with default driver Building database Step 1/3 : FROM mysql:debian debian: Pulling from library/mysql 9e3ea8720c6d: Pull complete 6654d9c12503: Pull complete
20%
GlusterFS
27.03.2012
Home »  HPC  »  Articles  » 
Gigabit Ethernet, and a 64-bit version of Linux. For GlusterFS 3.2.5, which was the latest version at press time, the developers recommend Red Hat Enterprise Linux 6.1 because it has undergone the most
20%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
might still be around today. (CC BY 3.0 US [1]: Laura Poitras/Praxis Films, Wikimedia) Figure 2: The US authorities sought a court order forcing
20%
High-performance load balancing
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © meyrit, 123RF.com
:ita::2 peer_ipv4 = 192.168.10.3 peer_ipv6 = 2000:ita::3 vip_ipv4 = 192.168.10.1 vip_ipv6 = 2000:ita::1
20%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Suslov, 123RF.com
Julia julia> 1//2 + 1//3 5//6 julia> numerator(10//12) 5 julia> 2//3 == 4//6 true julia> 2//3 == 4/6 false After strings and the various types of numbers, the most important built-in data type
20%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
the executable, will open a meterpreter shell on the victim’s Windows box (see Figure 3). Figure 3: msfcli multi/handler options (above) and executing the listener
20%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
to reduce the zoom, use the m key to "minimize" (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts with the plus (+ ) key. Likewise, you can
20%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
=4444 E This command will open a listener on the local machine over port 4444. Once the victim runs the executable, it will open a meterpreter shell on the victim's Windows box (Figure 3
20%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
20%
Stat-like Tools for Admins
19.11.2014
Home »  HPC  »  Articles  » 
. The output is fairly similar to that of vmstat and dstat (Table 3). Table 3: Mpstat Output Column Output CPU Processor number to which the output refers. In Figure 6, it refers

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice