Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (149)
  • Article (53)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 21 Next »

14%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
"SubnetMax": "10.99.0.0", 07 "Backend": { 08 "Type": "udp", 09 "Port": 7890 10 } 11 } 12 [...] At first glance, this concept looks robust and simple
14%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
6 > db_nmap -v -sV 192.168.122.0/24 (...) [*] Nmap: Nmap done: 256 IP addresses (4 hosts up) scanned in 66.64 seconds msf6 > hosts Hosts ===== address mac name os_name os
14%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15 encryption_algorithm aes256; 16
14%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
source nfdump [5] tool does this job on an existing Linux server or on a lean virtual machine (VM). A CPU core, 256MB of RAM, and a 2GB hard drive are sufficient for the VM. You can install on Cent
14%
Verifying your configuration
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kritiya Sumpun, 123RF.com
wgossrvc Listing 4 setup_goss.sh Diff Additions 5a6 > GOSSVFLE='/lib/systemd/system/goss.service' 9,10c10,12 < sha256sum < tee --- > sha256sum > systemctl > tee 81a84
14%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
It’s called high-performance computing (HPC), not low-performance computing (LPC), not medium-performance computing (MPC), and not even really awful-performance computing (RAPC). The focus is doing
14%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
.21 –   EUR5.95 EUR1.00 (with French VAT) EUR2.78 (half price as of year two) – $2.92 License(s) AGPL, commercial GPL, LGPL, AGPL Commercial GPLv3
14%
Network performance in-terminal graphics  tools
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Lucy Baldwin, 123RF.com
$ ethstats -c1 eth0: 0.03 Mb/s In 0.14 Mb/s Out - 51.4 p/s In 38.8 p/s Out requests a single sample and shows a somewhat idle system. Grand Finale With a nearly inexhaustible supply
14%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"TracingConfig": { 17 "Mode": "PassThrough" 18 }, 19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc", 20 "Description": "", 21 "CodeSize": 432, 22 "FunctionArn": "arn
14%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
of this category currently on the free and open source software market. On the commercial side, Amazon's S3 probably works very similarly. Binary Objects Object stores rely on binary objects because they can

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice