Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%C3%A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (420)
  • Article (154)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 62 Next »

22%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
root:root /usr/local/bin/dockerize FROM google/cloud-sdk:alpine SHELL ["/bin/ash", "-o", "pipefail", "-c"] RUN apk add --no-cache --virtual .build-deps alpine-sdk libffi-dev openssl-dev python3-dev py3
21%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
: > numbers <- c(1, 2, 3, 4, 5) The c() function – the c stands for "concatenate" – combines the individual elements listed in parentheses. An equals sign can be used as an alternative for assignments, in line
21%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
to 192.168.122.236. Escape character is '^]'. 220 (vsFTPd 2.3.4) user mfeilner:) 331 Please specify the password. ^] telnet> quit Connection closed. [mfeilner@parrot][~] $ telnet 192
21%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
bytes:215392635 (215.3 MB) TX bytes:1759757 (1.7 MB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK
21%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
. The primary changes made to the benchmarks of the latest version 3.4.2 of the NPB are: added class F to the existing S, W, A, B, C, D, E added dynamic memory allocation added MPI and Open
21%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
'^$' | sort -n | uniq -c | awk '$1 >= '${BLOCK_PREFIX_THRESHOLD}' {print $2" "$3}'` 174 175 # echo "${PREFIXES}" 176 for P in $( echo "${PREFIXES}" | awk '{print $2}' ); do 177 DEL_IPS=`echo "${QUERY
21%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Number: 00282-30340-00000-AB9A5 Version: 6.3.9600 The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
21%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job. ... made to the benchmarks of the latest version 3.4.2 of the NPB are: added class F to the existing S, W, A, B, C, D, E added dynamic memory allocation added MPI and OpenMP programming models ... Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job.
21%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
. The required modifications are explained in the Huginn wiki [3]. The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3
21%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
64ae120c27e504088d8c2ce29a0fa7f85c The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 62 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice