Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1174)
  • Article (301)
  • News (173)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 166 Next »

28%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
28%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
/log/time.log --size 0; done"] EOF The deployment has deliberately been kept simple. In the shell, it just writes the current date to a logfile at regular intervals. Now, you can start writing a Blueprint. In many
28%
Fedora 16
01.03.2012
Home »  Articles  » 
 
features such as Linux kernel 3.1 and Gnome 3.2.1. The Fedora-customized Gnome version 3.2.1 has what it takes to rocket up to the top of the must-have chart for non-KDE users – and to take users away from
28%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
Modulefiles: 1) fftw/3.3.2/gnu4 2) mpich2/1.4.1p1/gnu4 $ ssh n0 $ module list Currently Loaded Modulefiles: 1) fftw/3.3.2/gnu4 2) mpich2/1.4.1p1/gnu4 $ exit $ export NOMODULES=1 $ ssh n0 $ module list
28%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
NIST has chosen the Keccak algorithm as the new cryptographic hash standard but, in real life, many users are still waiting to move to its predecessor SHA-2. ... .1, do not improve on this; it is not until TLS 1.2 that TLS began to support newer algorithms with SHA-2. On the server side, you need version 1.0.1 of OpenSSL to enable TLS 1.2, for example ... NIST has chosen the Keccak algorithm as the new cryptographic hash standard, but in real life, many users are still waiting to move to its predecessor, SHA-2.
28%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
are the same as decimal 18. This command searches for packets with this type of data in byte 13: # tcpdump -n -r dumpfile.lpc -c 10 'tcp[13] == 18' and host 172.16.183.2 Figure 5 is an example of what
28%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
32 printui.dll,PrintUIEntry /in /n /Y \\SRV\PP The Rundll32.exe application steps into the breach for the weak internal commands of command.com. Here, it defines the printer as a network printer (/in
28%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
01 auto br0 02 iface br0 03 bridge-ports swp1 swp2 swp3 swp4 swp5 04 bridge-stp on Because the list would be pretty long for 52 ports, you can also do the following specify
28%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
. Listing 1 server Command Output API: http://192.0.2.10:9000 http://127.0.0.1:9000 RootUser: minioadmin RootPass: minioadmin Console: http://192.0.2.10:9090 http://127.0.0.1:9090 Root
28%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
level of TCP streams and UDP datagrams) and 7 (HTTP/application protocols) can be configured comprehensively, whereas the underlying Layer 2 and Layer 3 network (frames and IP packet layers) cannot. Who ... Mesh Service for OSI Layers 2 and 3

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice