Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 171 Next »

23%
Chive
17.04.2012
Home »  Articles  » 
 
highlighting for SQL statements, thus making the code far easier to read and syntax errors far easier to identify. Chive also lets you export SQL and CSV files (Figure 4
23%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
account and get a terminal session (Figures 4 and 5). The first time I do this, I will be asked to accept a key fingerprint. Figure 4: Login via SSH
23%
Platform Games on Heroku
12.10.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
.3.11 Successfully installed actionmailer-2.3.11 Successfully installed activeresource-2.3.11 Successfully installed rails-2.3.11 6 gems installed -----> Compiled slug size is 4.7MB
23%
Virtualization with Microsoft Hyper-V
29.06.2011
Home »  CloudAge  »  Articles  » 
 
. Dynamic memory technology manages memory on virtual machines (VMs) running on Hyper-V hosts (Figure 4). Virtual guests communicate with the hypervisor and tell it their RAM requirements. If the host has
23%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
). Figure 3: Job summary tables from darshan-job-summary.pl output PDF. Another group of useful tables are shown in Figure 4. The top table presents the cumulative time spent in reads and writes
23%
Sharing a Linux Terminal Over the Web
08.08.2022
Home »  HPC  »  Articles  » 
commands. For example, a user on a Linux system starts tty-share  (Figure 4). The URL is shared with the Windows user who then pastes it in their browser. Figure 5 is a screenshot of the Brave browser
23%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
-WMIObject Win32_OperatingSystem | fl Name, BuildNumber, Version Name: Microsoft Windows 8.1 Enterprise|C:\Windows|\Device\Harddisk0\Partition4 BuildNumber: 9600 Version: 6.3.9600 The command
23%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
 Suites:        Forward Secrecy                   OK - Supported        RC4                               OK - Not Supported      * SSLV3 Cipher Suites:       Server rejected all cipher suites.    * Downgrade
23%
Obtain certificates with acme.sh
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Stuart Miles, 123RF.com
, such as: _acme-challenge.www.example.org. 300 IN TXT "Y5YvkzC_4qh9gKj6...jxAjEuX1" Additionally, the protocol uses nonces to protect against replay attacks and provides a workflow for revoking issued
23%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice