Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (594)
  • Article (182)
  • News (20)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 80 Next »

17%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
to recover the encrypted files. Once the encryption process is complete, Locky stores a ransom demand and also sets up a desktop background with a ransom demand. It requires the victim to pay a ransom of 0
17%
The simpler alternative to cron: Whenjobs
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© stillfx, 133RF.com
, you will need the matching compiler and a few packages. You can install these with the following command, for example, on Ubuntu 12.10: sudo apt-get install ocaml ocaml-findlib libcalendar
17%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
consumed virtually no resources on a CPU with 12 cores. The file /var/lib/aide/aide.db.new was created and had to be renamed aide.db for use in checks. The output will contain the checksums of the various
17%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © 123RF.com
for your website (rather than my example site www.m0nk3y.biz ) and a descriptive Origin ID (Figure 3). Leave all the other options at the defaults and scroll down to Distribution Setting, where you add your
17%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
wget sudo unzip -o apache-storm-0.9.2-incubating.zip -d /usr/share/ sudo ln -s /usr/share/apache-storm-0.9.2-incubating /usr/share/storm sudo ln -s /usr/share/storm/bin/storm /usr
17%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
$keyfile /etc/ssh 08 chmod 644 /etc/ssh/$filename 09 done 10 if [ -f .ssh/config ]; then 11 cat .ssh/config >> /etc/ssh/ssh_config 12 sed -i 's|~/.ssh|/etc/ssh|g' /etc/ssh/ssh_config 13
17%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
. For example, [laytonjb@home4 ~]$ agedu -w Using Linux /proc/net magic authentication URL: http://127.0.0.1:42821/ A screenshot of the web browser output is shown in Figure 1
17%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © vska, 123RF.com
Types "Unified" -MailEnabled $true -SecurityEnabled $true -LabelId f460a5b0-8d8e-4ac1-bb92-afb9ea22f9da If you followed the steps and created the LabelActions as shown in the example, the labeled team
17%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
     color: "Red", 11     Model year: 1988 12   } 13 }; Programmers can use variables directly; the appropriate var s are added by CoffeeScript when you compile. As in shell scripts, the hash sign (# ) starts
17%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
Definition), against which all requests get validated as soon as they are received by one of the processing servers. Listing 2 Request XML 0" encoding="UTF-8"?>

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice