Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (112)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 150 Next »

16%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
. Immediately after posting a sample, Cuckoo outputs appropriate messages on the console (Listing 3). Listing 3 Cuckoo Output 2016-07-25 17:37:00,192 [lib.cuckoo.core.scheduler] INFO: Starting
16%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
are generating a test installation only. While the installation process is running, the Ubuntu host needs additional resources. Even though only 3GB of RAM and two processor cores are required, the installation
16%
New ITIL framework and certification
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Dioptria, sxc.hu
, which roughly maps the Service Value Chain from ITIL 3, and the Four Dimensions Model. ITIL also defines a number of guiding principles that have to be observed across the board, some of which are found
16%
HDF5 and Parallel I/O
17.05.2017
Home »  HPC  »  Articles  » 
, ALLOCATABLE, TARGET :: DATA(:,:)   ! Data to write 18      INTEGER :: RANK = 2             ! Dataset rank 19    20      CHARACTER(MPI_MAX_PROCESSOR_NAME) HOSTNAME 21      CHARACTER(LEN=100) :: FILENAME  ! File name 22      CHARACTER(LEN=3) :: C
16%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
depends first and foremost on keeping the key a secret (Kerckhoffs’s principle) Ð but why give the attacker a head start by revealing other clues, such as the cryptographic encryption algorithms? Without
16%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
] command ... -S return largest of remote command return values -h output usage menu and quit -V output version information and quit -q list
16%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
used a virtual machine on a VMware ESX server. The physical underpinnings were a ProServ II server by ExuS Data with two Xeon quad-core processors and 16GB of RAM (Figure 1, top
16%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
16%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
.9 Ready 3h v1.6.2 Listing 2 Kubernetes Node Data Structure in YAML $ kubectl get node 10.126.22.9 -o yaml apiVersion: v1 kind: Node metadata: creation
16%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
Apr 14 11:00 /boot/initramfs-3.10.0-957.el7.x86_64.img Troubleshooting the Shell If the system does not boot as usual and access to the root volume is not possible, dracut provides a shell

« Previous 1 ... 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice