Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1165)
  • Article (300)
  • News (171)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 164 Next »

27%
Kali Linux 2025.3 Released with New Hacking Tools
30.09.2025
Home »  News  » 
 
to the images are now part of the virtual machine build scripts, and those scripts have also been upgraded to the Packer 2.0 standards. As far as the new hacking tools are concerned, you get Caido and Caido CLI
27%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
smartphone users, which was 2.9 per 1,000 smartphone users in 2011, is expected to climb to 4.0 in 2013." The Azaleos Managed MDM service provides device security management for lost, non-compliant, offline
27%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
exit codes when it terminates, you can use Unix conventions. 0 stands for error-free processing, whereas 1 indicates some problems were encountered. This value is stored in the $? shell variable, which
27%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
name. In OCFS2's case, a single ASCII file is all it takes (Listing 1). Listing 1 /etc/ocfs2/cluster.conf node: ip_port = 7777 ip_address = 192.168.0.1 number = 0
27%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
approach to setting up the PKI; you will find the scripts in /usr/share/doc/openvpn/examples/easy-rsa/2.0. You can start by modifying a couple of things in the vars; this is mainly to make the procedure more
27%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
main(int argc, char *argv[]) 06 { 07 char *newblock = NULL; 08 09 for (int allocation = 0; newblock = (void *) malloc(1024 * 1024); allocation++) 10 { 11 //for (int i=0; i < (1024 * 1024
27%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
to "0" to make the # command run *after* the blocking has occurred. # KILL_RUN_CMD_FIRST = "0" # # KILL_RUN_CMD="commands_to_run" Customization I came across a few limitations with the way a third
27%
PowerShell Part 3: Keeping PowerShell in the Loop
10.05.2012
Home »  Articles  » 
 
need is a little patience and light scripting skills. PowerShell versions 1.0 and 2.0 have a somewhat limited ability to grab information from remote systems singly or in bulk. Therefore, you have
27%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
29 SlurmctldTimeout=300 30 SlurmdTimeout=300 31 InactiveLimit=0 32 MinJobAge=300 33 KillWait=30 34 Waittime=0 35 # 36 # SCHEDULING 37 SchedulerType=sched/backfill 38 SelectType=select/cons_res 39
27%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
Timeout=300 31 InactiveLimit=0 32 MinJobAge=300 33 KillWait=30 34 Waittime=0 35 # 36 # SCHEDULING 37 SchedulerType=sched/backfill 38 SelectType=select/cons_res 39 SelectType

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 164 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice