Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1067)
  • Article (329)
  • News (245)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 165 Next »

12%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
store? The first part of this workshop demonstrated how an additional node can be added to an existing cluster using ceph osd crush add 4 osd.4 1.0 pool=default host=daisy assuming that daisy
12%
Archiving teams and channels
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Adis Corovic on Unsplash
need the ID to archive a team: Set-TeamArchivedState -GroupId 5a8edffb-43ec-4dbc-bf12-4b50d2c65240 -Archived:$true You can check the value of Archived again if you query it with Get-Team. To make sure
12%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
at the contents of the Uncomplicated Firewall (UFW) configuration file in Listing 2. Listing 2 /etc/logrotate.d/ufw /var/log/ufw.log { rotate 12 monthly missingok notifempty compress
12%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
is Computer A. This type of attack is known as Man in the Middle attack. This article covers a number of tools used in arp cache poisoning attacks, including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy
12%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
bo in cs us sy id wa 0 0 1360 27788 125860 269804 0 0 390 43 308 572 8 3 84 5 In this case, it’s the io section you’re interested in. Input/Output is seemingly defined
12%
Editorial
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
the passwords these "security experts" were using to protect their data? Some of the passwords uncovered in the attack were: HTPassw0rd Passw0rd!81 Passw0rd Passw0rd! Pas$w0rd Rite1
12%
Monitoring Cloud Service Charges
17.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
_costs = { 't1.micro' => 0.02, 'm1.small' => 0.095, 'c1.medium' => 0.19, 'm2.2xlarge' => 1.14, 'm2.4xlarge' => 2.28 } Then I list the regions. This could have been dynamic, but I don’t want
12%
TinyDNS
02.03.2012
Home »  Articles  » 
 
the directory structures needed: tinydns-conf tinydns tinydns /etc/tinydns 12.34.56.78 This command tells TinyDNS that you want to run it as user tinydns under group tinydns to keep security threats
12%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
for this example: Order Deny,Allow Deny from All Allow from 12.12.12.12 Allow from 23.23.23.23 Allow from 34.34.34.34 This example denies access to everybody except the IPs listed, which follows the very sensible
12%
News for admins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
CC BY 3.0
be in memory," said Guinet on the project page. The WannaCry ransomware attack has been the worst attack of its kind. The attack started on Friday May 12, 2017 and infected more than 230,000 computers across

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 165 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice