Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1294)
  • Article (303)
  • News (162)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 177 Next »

9%
Penetration Testing
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
    IPv6 Attack Toolkit NodeZero Linux includes THC-IPV6, a comprehensive attack toolkit for the IPv6 protocol suite. THC-IPV6 comprises state-of-the-art tools such as live scanning, man
9%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
17 %description 18 Custom SELinux policy module. 19 20 %prep 21 if [ ! -d custom-selinux-policy ]; then 22 mkdir custom-selinux-policy 23 fi 24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
9%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
gas prices. The company announced its VMware Ready Desktop Solutions program on June 22. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
9%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
cores (57, 60, or 61), memory size (6, 8, or 16GB), clock speed (1053, 1100, or 1238MHz), and cooling concept (active or passive). The basic architecture is the same for all cards: Like the Larrabee
9%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
9%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
SCO components on a single computer make sure you comply with the following hardware requirements: Minimum 1GB RAM, 2GB RAM recommended 200MB available hard disk space Dual-core processor
9%
Create flexible backups with Kopia
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Marcus Woodbridge on Unsplash
is primarily optimized for managing blocks of around 20MB, another level, known as content-addressable object storage, in combination with metadata management, lets you store more or less arbitrary objects
9%
President's 2017 Budget Increases HPC Spending by 50%
24.02.2016
Home »  HPC  »  News  » 
 
for Measurement Science for Future Computing Technologies and Applications, which sees an increase from $13.6 million to $25.6 million. The total discretionary spending for NIST is $1 billion. Of course
9%
Malicious XZ Attack Planned for Years
08.04.2024
Home »  News  » 
 
The malicious code recently discovered in versions 5.6.0 and 5.6.1 of XZ Utils “appears to be the product of a carefully crafted supply chain attack that took several years to set up,” reports
9%
Space – The Final Frontier
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
of "I remember my first disk was only 30MB and it cost $200" comes flying over the bow, and someone returns fire with "Our first server had two mirrored 90MB disks for a company of 100 people." And

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 177 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice