Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (948)
  • Article (319)
  • News (103)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 138 Next »

17%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
-encrypted hard drives (SEDs). However, not everyone is using encryption. Recent revelations about accessing the data of individuals includes the story about how the NSA and Britain’s Government Communications
17%
What's new in Samba 4
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Natalia Sheinkin, 123RF.com
Samba 4 has been under development for 10 years. In that same time, the Samba 3.x series also has seen numerous releases and advancements. This parallel development has led to some confusion over
17%
Converting filesystems with Fstransform
24.09.2012
Home »  Articles  » 
 
drawbacks. Not Without My Backup For example, Fstransform only supports the common filesystems on Linux: ext2, ext3, ext4, ReiserFS, JFS, and XFS. The Windows filesystems NTFS, MS-DOS, and FAT32
17%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
of manipulated USB devices. You can try for yourself what is possible with such USB devices: The "USB Rubber Ducky" [3] offered by Hak5 looks like a USB stick, but it is also a keyboard and can be used to execute
17%
HTML to database with a Perl script
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Danila Krylov, 123RF.com
_text) { 066 $split_text[$split_text_count] =~ s/\n+//g; 067 $this_split = $split_text[$split_text_count]; 068 $this_split =~ s/[ ]+//g; 069 if ($this_split != "") { 070 $query
17%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
Thorsten Scherf 52 - initial version Running rpmbuild -ba custom-selinux-policy finally gives you the source and binary RPMs. You need the appropriate development tools in place
17%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
is made possible because cron only checks for a date format and not that the date of the task is legitimate. The crontab date specification for CronRAT is 52 23 31 2 3, which would generate a runtime error
17%
How Linux and Beowulf Drove Desktop Supercomputing
17.02.2021
Home »  HPC  »  Articles  » 
tools, it is close to the beginning. More importantly, it is where the concept of free software started. GNU (an acronym for GNU’s Not Unix) was launched in September 1983 by Richard Stallman
17%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
Lately, I’ve been thinking more about what’s happening in the world of HPC. The items that have risen to the top are the following: During SC24 I had a few very enthusiastic people ask me how
17%
Secure microservices with centralized zero trust
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Christopher Ruel on Unsplash
company, or a multinational conglomerate; the important points are the top-down control of every identity issued, its structure, its time to live (TTL), and, of course, the workload(s) to which it is issued

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice