Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb 12%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (82)
  • Article (39)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 Next »

20%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
20%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
+----------------------------------+---------+---------------------+ 40 | 47e0142a3638fdc24fe40d4e4fbce3f1 | Row 1 | 2015-09-13 15:24:12 | 41 | b833c1e4c5bfc47d0dbe31c2e3f30837 | Row 3 | 2015-09-13 15:24:14 | 42 | c7d46523a316de4e1496c65c3cbdf358 | Row 2 | 2015
20%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
OS virtual machine (VM). Photon OS [6] is a specialized small Linux built for Docker, Kubernetes, and security. A Photon VM is about 150MB on disk: Photon runs on VMware, as well as Amazon and Azure
20%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny
19%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
) Newer implementations with NetFlow version 9 offer additional information about Multicast, IPv6, BGP (Border Gateway Protocol), and MPLS (Multiprotocol Label Switching). The package's information content
19%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
(about changing the password) by pressing n . However, confirm all other prompts by pressing y . When the script is done, you need to grant Huginn access to MySQL in the MySQL command-line client, which
19%
Safeguard and scale containers
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © cepixx, 123RF.com
, such as the process layout below the Docker daemon. With regard to separation of concerns, Systemd [8] acts as a centralized resource management instance and has been discussed by the rkt project [9]. The system
19%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
and – importantly – the string ESMTP (Listing 1). Listing 1 Unfiltered SMTP Connection $ telnet mail.sys4.de 25 220-mail.sys4.de ESMTP Postfix EHLO client.example.com 250-mail.sys4.de 250-PIPELINING
19%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job. ... made to the benchmarks of the latest version 3.4.2 of the NPB are: added class F to the existing S, W, A, B, C, D, E added dynamic memory allocation added MPI and OpenMP programming models ... Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job.
19%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
with the cloud-init framework [9] then step in; the matching configuration files are found in /etc/cirros-init/. The scope of supply includes templates for Amazon EC2, for a configuration drive (configdrive

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice