Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (852)
  • Article (204)
  • News (99)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 116 Next »

9%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
9%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
Name ------- ------ ----- ----- ----- ------ -- ----------- 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 74 9 1464 2568 42 0.09 2172 armsvc 195 10 2380 2984 62
9%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
Control Manager on computer 'XENAPP0'. This operation might require other privileges. At line:1 char:12 + Get-Service <<<< -ComputerName XENAPP0 + CategoryInfo : NotSpecified: (:) [Get
9%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
, the users from the admin group and sudo , can do everything, and the remaining users can do nothing. Listing 1: Ubuntu 12.04 /etc/​sudoers file # Redefine environmental variables: Defaults        env
9%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator and Mydigipass.com. Info [1] RSA Security [2] SafeNet [3] SMS Passcode (in German) [8] LSE LinOTP [9] Mobile-OTP [10] Mydigipass API [11] Demo token [12] Vasco [13] Mydigipass plugins
9%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
-ICE series, OWASP BWA, and Web Security Dojo. And remember, do not learn to hack – hack to learn! The Author Marcin Teodorczyk has been passionate about Linux for over 12 years. Currently he works with grid
9%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
 time:           5.245 seconds     iter    1   iter    5   iter   10   iter   15   iter   20    Benchmark completed  VERIFICATION SUCCESSFUL  L2 Norm is  0.5706732285739E-06  Error is    0.1345119360807E-12      MG
9%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
DRAM. At the extreme, you can pretty much buy systems with 1-2TB of memory, but you probably don't buy too many of them because of cost. Typical compute nodes are in the 64-256GB range. Persistent memory
9%
Multicore Processing in Python
22.08.2017
Home »  HPC  »  Articles  » 
MP portion of the code is working. Listing 3: Output of hw Python Module [laytonjb@laytonjb-Lenovo-G50-45 F2PY]$ python Python 2.7.12 |Anaconda custom (64-bit)| (default, Jul 2 2016, 17:42:40) [GCC 4
9%
Shared Storage with NFS and SSHFS
12.09.2018
Home »  HPC  »  Articles  » 
 FUSE kernel interface version 7.12 This example is on an old desktop system, so the software versions are on the old side. Testing SSHFS with Linux Now that SSHFS is installed, you can test it. For this example, I will use

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 116 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice