Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00s Llorente 48 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (69)
  • Article (25)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 10 Next »

100%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
_64 3/4 19 Verifying : bzip2-1.0.6-13.el7.x86_64 4/4 20 21 Installed: 22 mssql-server.x86_64 0:14.0.3026.27-2 23 24 Dependency ... 48
99%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
], and MongoDB 3.6 [3]. If not already present, installing Java (as root or using sudo) before Elasticsearch and MongoDB is recommended: yum install java-1.8.0-openjdk-headless.x86_64 You should remain root ... 48
99%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
Gateway Initiative (OSGI) technology. The latest version (version 3.7) is available at the project website [1], where you will also find other introductory materials, including blogs, videos, and sample ... 48
99%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue ... 48
62%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... " { 11 endpoint = "https://192.168.3.15:8006/" 12 username = "root@pam" 13 password = "proxmox" 14 insecure = true 15 tmp_dir = "/var/tmp" 16 17 ssh { 18 agent = true 19 } 20
62%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... is not verified. The purpose of this routine is to prevent man-in-the-middle (MITM) attacks. Sake uses the x/crypto/ssh Go package, which is a bit quirky [3]. An issue I stumbled on when testing Sake
35%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
with the chaotic flood of data used by legacy DDoS attacks in previous years (also see the "What Is DDoS?" box). According to a survey by Arbor Networks, typical bitrates in DDoS attacks last year were around 1.48 ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... DDoS in the Cloud
27%
S.M.A.R.T., smartmontools, and drive monitoring
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © _fla, 123RF.com
Barracuda (SATA 3Gb/s, 4K Sectors) Device Model: ST3000DM001-1CH166 Serial Number: Z1F35P0G LU WWN Device Id: 5 000c50 050b954c3 Firmware Version: CC27 User Capacity: 3,000,592,982,016 bytes [3.00 TB] Sector ... Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A.R.T. features ... S.M.A.R.T., smartmontools, and drive monitoring
24%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
. (See the "OpenShift Version 3" box for more information.) OpenShift Version 3 Version 3's combination of Docker (the container system), Kubernetes (Google's container orchestration management ... Exploring OpenShift – Red Hat's next-generation PaaS tool
23%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
, mainly because it is inside the world’s fastest supercomputer – the Tianhe-2; in fact, the 48,000 Xeon Phi cards built in to the Tianhe-2 help it deliver nearly twice the raw performance of the second ... Intel’s powerful new Xeon Phi co-processor

1 2 3 4 5 6 7 ... 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice