Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (309)
  • News (201)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 176 Next »

16%
Virt-builder generates VM images in a flash
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Petris, fotolia.com
"Libguestfs" by Richard W.M. Jones, Linux Magazine , September 2010, issue 118, pg. 22 New tool: virt-builder: http://rwmj.wordpress.com/2013/10/05/new-tool-virt-builder/ Virt-builder templates: http
16%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
, with 45 percent saying it will increase slightly and 32 percent stating it will increase significantly. Only 22 percent of respondents claimed open source adoption will remain the same and one percent
16%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
was received [2]. Modular Extensions for Apache Apache version 2.2 and newer has a mod_reqtimeout extension that lets you configure the RequestReadTimeout option, which you can use to set different request
16%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
’s IP address. Roughly, it should look something like Listing 1. The IP address of the master node is 10.1.0.250. Be sure to check that the compute nodes can ping this address. Also be sure that ntp
16%
How to query sensors for helpful metrics
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by patricia serna on Unsplash
--name flux18 --volume /var/pods/flux18/etc:/etc/influxdb:Z --volume /var/pods/flux18/data:/var/lib/influxdb:Z --net pub_net --ip 192.168.2.81 --mac-address 52:54:C0:A8
16%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
in a loop. Thus, the application can be switched to Capsicum capability mode with just two additional lines of program code: if (cap_enter() < 0) error("cap_enter: %s",pcap_strerror(errno)); The following
16%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
a step in the right direction. Authentication policies can, to a certain extent, help limit the attack surface for brute force. For example, a Tier 0 account cannot be blocked by a brute-force attack
16%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
openQRM to use (this is typically eth0). Then, openQRM creates the required MySQL database; the root password you defined for MySQL is needed during the install. Finally, you need to upload a valid
16%
PC over IP
03.09.2013
Home »  Articles  » 
 
and easily with the ping scan method (-sP ; Listing 1). Listing 1: IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0.190) Nmap
16%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
an integer argument, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 176 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice