Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1174)
  • Article (301)
  • News (173)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 166 Next »

28%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
with kernel version 2.6.0, security modules were supposed to use the standardized Linux Security Modules (LSMs) [2], which were created specifically for this purpose and which are also used by other popular
28%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
( ) Used for grouping and back references \n Back reference: Expands to whatever matched the n th ( ) pattern Suffixes How Many to Match ? 0 or 1 * 0
28%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
construct for assigning a value to a variable – here the variable host. The form [lindex $argv n] returns the n th argument to the script (numbering starts at 0), so the first command places the first script
28%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
+ 1 27 my_record%z = counter + 2 28 my_record%value = counter * 10.0 29 write(8) my_record 30 10 continue 31 endif 32 33 close(8) 34 35 end program ex1
28%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
edition, which was published early last year. The first edition, available online refers to Lua 5.0. The language has now moved to version 5.2, but the online book is still up to date to a large extent
28%
John the Ripper
22.08.2011
Home »  Articles  » 
 
,000 commonly used passwords: $ john -wordlist:password.lst passfile.txt Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) admin (root) t-bone (khess) guesses: 2 time: 0:00:00:00 100
28%
Microsoft System Center Virtual Machine Manager 2008 R2
14.07.2011
Home »  CloudAge  »  Articles  » 
 
Shell 1.0 or 2.0, Windows Remote Management (WinRM) 1.1 or 2.0, and the .NET framework 3.0 (SP1). The webbased SCVMM SelfService Portal additionally requires Internet Information Server (IIS) version 7.0 ... Microsoft System Center Virtual Machine Manager 2008 R2
28%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
.out.println(allrecords.values().toArray()[0].toString()); 45 } 46 47 Session.logout(con); 48 } 49 50 } Infos XenServer Free: http://www.citrix.com/English/ps2/products/product.asp?contentID=683148 SDK ... 2
28%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
might still be around today. (CC BY 3.0 US [1]: Laura Poitras/Praxis Films, Wikimedia) Figure 2: The US authorities sought a court order forcing
28%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
|__ Port 5: Dev 2, If 0, Class=Video, Driver=uvcvideo, 480M |__ Port 7: Dev 3, If 0, Class=Wireless, Driver=btusb, 12M |__ Port 7: Dev 3, If 1, Class=Wireless, Driver=btusb, 12M |__ Port 10: Dev

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice