Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 133 Next »

16%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
                 28G  119k   28G   1% /run/user/1000 /dev/mapper/vg0-lv0  2.0T   29k  1.9T   1% /mnt/test The commands and concepts to this point have been explained “mechanically.” There is much more to using LVM
16%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
programming interface (API) is consistent regardless of the back end and, in many cases, is much easier to use than those in a specific framework. This last point is important. You don’t have to learn Tensor
16%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
the Bro configuration is to point Bro at the network interface that is being used for the network tap. Once Bro receives an IP packet, its application architecture comes into play. Bro's event engine
16%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
. In this article, I will be firing some shots at existing systems to provide some simple security testing examples, and I point you toward a number of vanilla examples later on. Run The Gauntlt The powerful
16%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
testing examples, and later on, I point you toward a number of vanilla examples. Run the Gauntlt The powerful Gauntlt's raison d'etre is to write security as code into your test suites (e.g., the ever
16%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
-Shellcode cmdlet starts the machine in the process space of the current PowerShell. Finding Unknown Shares Network shares that are not inventoried, whose permissions structure is obsolete and point to users who
16%
Sharing threat information with MISP
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Ricardo Resende on Unsplash
will be shown some critical errors. You can address these errors at a later point in time. First launch some processes and then install some software packages in the VM. Click on the Worker tab in the Server
16%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
with common interests. They then want to suggest further articles to each reader that match their interests. The starting points for the analysis are a SQLite database with the article ratings (Table 1
16%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
, modern databases, or the cloud. Together with the connectors available for Kafka Connect, Kafka forms an efficient integration point without hiding the logic or routing within the centralized
16%
Improving performance with environment variables
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © sgame, fotolia.com
for running the two scripts are presented in Table 2 (where GFLOPS is a billion floating-point operations per second). First, they are run on a single core, and then on all cores. A fair amount of variability

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice