Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1012)
  • Article (295)
  • News (154)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 147 Next »

16%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
facilitates the Mutillidae II container install from the OWASP GitHub repository [6]. I have a vanilla Debian Linux instance in AWS, so I start by installing Docker Engine: $ apt install docker.io The new
16%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
-performance requirements, although it is not uncommon in smaller companies. The setup also allowed the candidates to test on equal terms. Version 1.97 of Bonnie++ [5] and IOzone 3.429 [6] were the test tools. To begin, I
16%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
to OpenStack integration is evidenced by the detailed documentation on the topic of “RHSS and OpenStack” in the RHSS guide (Figure 6). Figure 6: If you
16%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
” according to the assessments after the first tests hardly helped improve the situation. However, this criticism relates primarily to desktop use, and in particular to errors in the new Gnome version 3.6
16%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle
16%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
to select the source and target addresses, which are referred to as local and remote . Typically, only restrictions on remote addresses will be relevant. In the input field, you can enter both IPv4 and IPv6
16%
Green IT
24.10.2011
Home »  Articles  » 
 
) and about 6 million Euros (large corporation). The total period of the study was divided into segments of three years each, because this reflects both the typical warranty period and the typical write
16%
Virtual switching with Open vSwitch
28.07.2011
Home »  CloudAge  »  Articles  » 
 
time. To do so, load the kernel module manually: modprobe datapath/linux 2.6/U openvswitch_mod.ko If this command fails, you probably need to unload a bridge module: rmmod bridge. The kernel module
16%
MobaXterm: Unix for Windows
23.07.2012
Home »  Articles  » 
 
registered. Figure 6 shows how easy it is to access a KVM hypervisor virtual machine via VNC. Figure 6: MobaXterm also enables quick graphical access to a VNC
16%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
with information parsed in the /proc/ table. A partial list of the tools and data sources used includes: numastat [6] mpstat [7] (a personal favorite) nvidia-smi [8] ibtracert [9] ibstatus [10

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice