Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (289)
  • News (144)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 144 Next »

17%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle
17%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
to select the source and target addresses, which are referred to as local and remote . Typically, only restrictions on remote addresses will be relevant. In the input field, you can enter both IPv4 and IPv6
17%
Green IT
24.10.2011
Home »  Articles  » 
 
) and about 6 million Euros (large corporation). The total period of the study was divided into segments of three years each, because this reflects both the typical warranty period and the typical write
17%
Virtual switching with Open vSwitch
28.07.2011
Home »  CloudAge  »  Articles  » 
 
time. To do so, load the kernel module manually: modprobe datapath/linux 2.6/U openvswitch_mod.ko If this command fails, you probably need to unload a bridge module: rmmod bridge. The kernel module
17%
MobaXterm: Unix for Windows
23.07.2012
Home »  Articles  » 
 
registered. Figure 6 shows how easy it is to access a KVM hypervisor virtual machine via VNC. Figure 6: MobaXterm also enables quick graphical access to a VNC
17%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
with information parsed in the /proc/ table. A partial list of the tools and data sources used includes: numastat [6] mpstat [7] (a personal favorite) nvidia-smi [8] ibtracert [9] ibstatus [10
17%
Distributed Linear Algebra with Apache Mahout
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Galbraith, Fotolia.com
]). For some alternative methods for installing and using the software, including a prebuilt Docker image, see the slide presentation at SlideShare [6]. Infos Samsara: https
17%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
the letter P was missing in PREFIX .) If you use multiple versions of MPI, you need to build Remora for each version. If you are using environment modules (e.g., Lmod [6]), you can easily write
17%
Set up subdomains with Apache and Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Saniphoto, Fotolia.com
) and Apache (with VirtualHost blocks). The starting point will be a freshly installed Debian 10.6 "Stable," on which I configure virtual hosts for the imaginary domains www.example1.de and www.example2.de
17%
Finding and recording memory errors
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
hour. In a previous article [6], I wrote a general introduction to ECC memory, specifically about Linux and memory errors, and how to collect correctable and uncorrectable errors. In typical systems

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 ... 144 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice