Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (9)
  • Article (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 Next »

100%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... : [devuan] 10 donkey: 11 user: root 12 host: donkey.operationalsecurity.es 13 tags: [devuan] 14 zebra: 15 user: root 16 host: zebra.operationalsecurity.es 17 tags: [devuan] 18 19
99%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... is easy enough (superuser privileges are required): arp -s 192.168.90.55 00:0c:29:c1:91:b1 The last field of the command is the MAC address, which is the unique identifier of the network device to which
24%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
-   1 days]:  53756  ( 13.85%)  ( 13.85% cumulative)    [   1-   2 days]:     73  (  0.02%)  ( 13.87% cumulative)    [   2-   4 days]:    121  (  0.03%)  ( 13.90% cumulative)    [   4-   7 days]:    168  (  0.04%)  ( 13
22%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
resource requirements. Although Apache is still king of the hill, approximately 30 percent of the top 10,000 websites already benefit from Nginx [2] (Figure 1
21%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
, the number of exploits contained in Metasploit has exploded to more than 2,000. Additionally, countless new targets have been added, including software from Adobe and Oracle and new databases. The framework
21%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
. These products cost less than $1,000, including disks, and all are easy to manage, even without IT personnel. Table 1 Test Equipment Specifications   QNAP Synology Thecus
21%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
extended Easy-RSA by adding a few scripts and currently manage 17,000 users. As Ralf Hildebrandt, Senior Network Engineer at CharitÈ and often a helpful point of contact, explained: "We use Easy
21%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
(plyr) 06 library(ggplot2) 07 08 setwd("~/R/RFI") 09 rfi <- read.csv("rfi-extract-July2011.log",header=TRUE, sep=",") 10 11 ## read in data to frame 12 data <- data.table(rfi) 13 ct <- count
21%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
Initialization 118 ! 119 DO j=2,m-1 120 DO i=2,m-1 121 u(i,j)=0.0d0 122 ENDDO 123 ENDDO 124 125 ! 126 ! Start looping 127 ! ============= 128 ! 129 DO WHILE (diff > tol) ! iterate until error
21%
Introduction to OpenMP programming
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Frank Rohde, 123RF.com
ENDDO 110 111 ! Left hand side of unit square: (W) 112 DO i=1,m 113 u(1,j) = 0.0d0 114 ENDDO 115 116 ! 117 ! Solution Initialization 118 ! 119 DO j=2,m-1 120 DO i=2,m-1 121 u(i,j)=0.0d0 122

1 2 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice