Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (970)
  • Article (282)
  • News (125)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 138 Next »

22%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
| sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- This command string correctly prepares the -Shellcode parameter value. When passed to -Shellcode without specifying a process ID, the Invoke
22%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
in the Domain Name System and shows the IPv4 or IPv6 address to which they refer. Figure 1: A first call with just the domain of interest produces many
22%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
over the color for the bars (Figure 6). Figure 6: Histogram of the groups of readers as determined by cluster analysis. Visualizing Multiple
22%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
bottlenecks, not absolute speedup numbers for the whole codebase. Second, given more resources, you will usually process more data or do more work. Gustafson's law [6] provides an alternative formulation
22%
Updating Docker containers with Watchtower
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Alan on Unsplash
_SCHEDULE="0 0 */6 * * *" to the docker run command. As discussed earlier, if you use containers for which automatic updates are difficult or unreliable, you can also configure Watchtower simply to check
22%
Run applications in a containerized sandbox with Firejail
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Victor Zastolskiy, 123RF.com
then be propagated to sub-namespaces. The cgroups namespace supports abstracting control groups, namespaces, or both. The time namespace, which was only released in 2020 with kernel 5.6, cannot abstract real time
22%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
.1.3 Running hypervisor: QEMU 1.6.1 If access works, a few lines of Python are all you need to retrieve the desired information (Listing 2). The hypervisor hosts are defined in the hv array. In the following
22%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
. Git-annex Linux Magazine already featured the file synchronization software git-annex [6] just over a year ago [7]. The main advantage of git-annex compared with a plain vanilla Git solution
22%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
6th Gen to 10th Gen Core CPUs and a number of Xeon processors. Some Intel-based systems have begun shipping (since Jan 2022) with the new microcode for both Intel Core and Xeon processors.
22%
Tech News
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
 
significantly more resources, which means that the scope of this attack is quite remarkable. According to Cloudflare, the botnet used for the attack consisted of 6,000 unique bots from 1,300 different networks

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice