Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1191)
  • News (404)
  • Article (299)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 190 Next »

19%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
to use this distro, although it does contain a few graphical tools, such as zenmap and wireshark . Even in graphical mode (which comes up with the Gnome desktop), most of the applications open
19%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
itself is explained in the box "Setting Up Kiwi NG." Setting Up Kiwi NG Depending on the distribution used, the maintainers offer ready-made installation packages from the openSUSE build service
19%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
the secretcode Python module. The shared object has the function hellofortran, which you use in the second command, secretcode.hellofortran(). I used the argument 5 in the test. OpenMP and f2py If you can
19%
Container IDE with cloud connection
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Christin Hume on Unsplash
important things. This is where Gitpod [1] comes in. One Pod, One Word The technology behind Gitpod picks up on relatively new developments from the open source scene. Besides Docker, it uses the Eclipse
19%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
with Nessus' own Nessus Attack Scripting Language (NASL). The result of the check is a list of identified vulnerabilities and open ports, which Nessus discovers with the help of Nmap. Although this arrangement
19%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
. To begin, insert the USB drive into a USB slot on your computer and open a Windows command prompt in Admin mode. To set up the USB drive, follow the DiskPart commands in Listing 1. The preparative work
19%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
Companies that provide web services for the outside world in their own infrastructure are exposed to a variety of threats. The developers of the open source mitmproxy tool describe it as the Swiss
19%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
, you need to install virsh by installing the libvirt-bin package: The counterpart on openSUSE goes by the name of libvirt-client . To make sure the program in place on your disk is working, just type
19%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
it’s fast, the encryption is very good if used correctly, the code is open-source, and it follows the OpenPGP specification that is an IETF standard. GPG was really designed as a command
19%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
. It can result in leakage of secret data in applications such as OpenSSL that has secret dependent control flow at any granularity level. In order to exploit this flaw, the attacker needs to run a malicious

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 190 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice