Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (199)
  • Article (60)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 26 Next »

15%
Mounting Compressed Archives as a User
25.01.2022
Home »  HPC  »  Articles  » 
In this example I begin with the directory of my projects shown in Listing 1, which I then archive. I leave creating a compressed TAR archive of this directory (a .tar.gz file) to you. Listing 1: Directory
15%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
depends on the liblzo2-2, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
15%
What Is an Inode?
23.03.2022
Home »  HPC  »  Articles  » 
-34-1804/72 /dev/loop7         17441    17441         0  100% /snap/gnome-3-38-2004/87 /dev/nvme1n1p1  62513152  7087560  55425592   12% /home /dev/nvme0n1p1         0        0         0     - /boot/efi /dev/loop8
15%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
, or kernel modules in use – you can find plugins for almost everything (a complete overview is available in the wiki on GitHub [12]). Figure 2: Everything seems
15%
A web application with MongoDB and Bottle
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Egor Arkhipov, 123RF.com
": 100000}}) 02 { "_id" : ObjectId("50bd2169a80e4531863ea2a8"), "Name" : "FC Schalke 04", "Colors" : "Blue-white", "Members" : 111000, "Address" : [ { "Street" : "Ernst-Kuzorra-Weg 1
15%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
      total packets:                 sent:  12,243,355   recv:  1,467,914    bytes sent:                   total:  16.90 G      per-sec:  3.22 M/s    bytes recv:                   total:  114.04 M
15%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
Query team is now focused on further developing jQuery 3. However, the old versions 1.12 and 2.2 still receive bug fixes, so developers can address the migration in peace. Infos jQuery: https
15%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
this and enter search keys!" > searchkeys.tex 10 11 # Edit search keys 12 13 gedit searchkeys.tex 14 15 16 # Create Latex document 17 18 echo "\documentclass[10pt,a4paper]{article} 19 \usepackage[utf8]{inputenc
15%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
15%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice