Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12%A9n Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (208)
  • Article (64)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 28 Next »

27%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
 ago                   infallible_knuth 7f2d5a7b7c86  docker.io/library/ubuntu:latest       /bin/bash   24 minutes ago  Exited (127) 22 minutes ago              wonderful_sinoussi 85b8e9efc636  docker
27%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
 $(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq 0,32 1,33 2,34 3,35 4,36 5,37 6,38 7,39 8,40 9,41 10,42 11,43 12,44 13,45 14,46 15,47 16,48 17,49 18,50 19,51 20,52 21,53 22,54 23,55 24,56 25
27%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'; 17 // stored hash, would
27%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
07 if [ -n "$OCF_RESKEY_monitor_sipuri" ]; then 08 check_binary sipsak 09 fi 10 11 if [ ! -f $OCF_RESKEY_config ]; then 12 ocf_log err "Config $OCF_RESKEY_config doesn
27%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
ScanOptions 21 { 22 Device = device, 23 PaperSource = PaperSource.Feeder, 24 PageSize = PageSize.A4, 25 Dpi = 300 26 }; 27 28 var images = new List
27%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9
27%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which
27%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
.33 164.69 0.75 rand_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8
27%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
.0.0.0 -c Clusterware to use corosync, zookeeper: -D Use direct I/O on the back end n/a -g Work as a gateway (server without back
27%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
Fn::Base64: 20 Fn::Join: 21 - '' 22 - 23 - "{\n" 24 - '"bucket"' 25 - ' : "' 26 - Ref: S3Bucketname 27

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice