Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 98 Next »

7%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
are encrypted and combined with each other more than 4,096 times. The protections this method offers are considerable and not easy to circumvent, but hackers do not necessarily fail here either. To test the WPA2
7%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
RDBMS implementations that forget their data every time they restart are almost worthless. Containers, on the other hand, are generally known to be stateless: They enter the same initial state after each ... If you spend very much of your time pushing containerized services from server to server, you might be asking yourself: Why not databases, as well? We describe the status quo for RDBMS containers.
7%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
that works locally will also work remotely if you specify -ComputerName in the syntax. The PowerShell Help System If you’re going to use PowerShell with any of its advanced features
7%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
for developers is time – where is the code spending most of its time? – because you can the focus on areas, or hotspots, that can be made to run faster. It might seem obvious, but it is worth noting that if you ... Profiling Python code – as a whole or by function – shows where you should spend time speeding up your programs.
7%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
:58:22 \\helix\processor(_total)\% \ processor time: 24.4764593867485 Querying an indicator once will output the current real-time value for the system. However, because it is only a single value
7%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
will locate any file that ends in .dat.2. If I truly get desperate to find a file, I can go to the root directory (/) and run the same find command. The second way I run find is to use its output as input
7%
What’s New in Microsoft Windows 8.1
21.01.2014
Home »  Articles  » 
themselves. All you have to do is right click the corresponding tile. The advantage of larger tiles is that Windows can display a greater amount of information in real time. For example, the Weather app shows
7%
What's new in Microsoft Windows 8.1
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Doroto C-, 123RF.com
in real time. For example, the Weather app shows the temperatures at several locations at a glance, which will mainly interest mobile users. If the computer is locked, users can still access features
7%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
-known manufacturer of such appliances), and observe its activities in real time. Both methods have their advantages and disadvantages. Reverse engineering requires a very good understanding of machine language
7%
High-performance backup strategies
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Kian Hwi Lim, 123RF.com
of threat has been emerging for some time: ransomware, which attacks companies through malware and, in the event of a successful infection, encrypts the existing data and demands cash to free it. Regardless

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice