Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (185)
  • Article (54)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 25 Next »

14%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
14%
Getting data from AWS S3 via Python scripts
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © erikdegraaf, 123RF.com
and processing the files with objects.all(), as shown in Listing 2. This method works perfectly with buckets of up to 1,000 objects, but because the underlying REST interface only provides a maximum of 1,000
14%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
_start_main (libmonitor.so.0.0.0) openss>>expview -vstatements Exclusive  Inclusive       % of   Statement Location (Line Number) Fpe Event  Fpe Event       Total Counts     Counts          Counts 12         12
14%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
/local 53G 29G 22G 57% /vnfs/usr/local From the output, it can be seen that only 217MB of memory is used on the compute node for storing the local OS. Given that you can easily and inexpensively buy 8GB
14%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
source nfdump [5] tool does this job on an existing Linux server or on a lean virtual machine (VM). A CPU core, 256MB of RAM, and a 2GB hard drive are sufficient for the VM. You can install on Cent
14%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
14%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
or definitions in the code that you should pay attention to. The first is STREAM_ARRAY_SIZE . This is the number of array elements used to run the benchmarks. In the current version, it is set to 10,000,000, which
14%
When I/O Workloads Don’t Perform
12.05.2021
Home »  HPC  »  Articles  » 
  30.85  72.31   13.16   20.40   0.26    70.44    83.89   1.97   3.52 nvme0n1         58.80   12.22  17720.47     48.71   230.91     0.01  79.70   0.08    0.42    0.03   0
14%
File Compression for HPC
10.11.2021
Home »  HPC  »  Articles  » 
 package-list.txt Output filename is: package-list.txt.lrz package-list.txt - Compression Ratio: 2.604. Average Compression Speed:  0.000MB/s. Total time: 00:00:00.04 By default, lrzip does not overwrite the original file
14%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
. The problematic compression is disabled. Listing 1 Configuration Example SSLProtocol -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2 SSLHonorCipherOrder on SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:DHE

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice