Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 37 Next »

72%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
applications. Java-related and performance-critical projects use JRuby [3], a Ruby implementation in Java that leverages Java bindings in a Rails project. RubyGems [4] is a de facto standard for extensions
72%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
. The connection coding is the same, so it doesn't need to be repeated. As in the example above, the port used is 2000, the server is ThisDomain.com, the protocol is tcp, and the type is SOCK_STREAM. The following
72%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
possibilities have opened up as to how a build pipeline can be orchestrated. Docker [3] is also a powerful tool that lets you implement customizations that otherwise require considerable maintenance
72%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
. But, you generally don't get those things unless the packets know where to go. IPv6 is very similar to IPv4 except for the parts that are completely different (e.g., link local and broadcast addresses ... 3
72%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
, and there are several implementations [3]. What Happened Thus Far Figure 1 shows a typical setup with port knocking. The components involved here are the client and the server application, with a firewall to keep out
72%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
some Perl commands to edit that file which is used on the head node (the Slurm server) (Listing 3). These commands are fairly easy to understand, even if you don’t know Perl. On the second and third
72%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
-charts https://raw.githubusercontent.com/kubernetes-sigs/kubefed/master/charts # helm repo list kubefed-charts https://raw.githubusercontent.com/kubernetes-sigs/kubefed/master/charts If everything worked, Helm
72%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
The device mapper with the dm-crypt target [1] and the Linux Unified Key Setup (LUKS) [2] extension are normally used to encrypt entire hard disks under Linux. Both components can easily handle any
72%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
uninvited guests, much like a firewall, although cyberattacks against a firewall can't necessarily be compared with a cannon that tears city walls down. Instead, imagine the city to be a heavily frequented
72%
Keeping it simple – the Ansible automator
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Komkrit Suwanwela, 123RF.com
. If required, you can also write your own modules, but thanks to Ansible's enormous range of functions out of the box, this is not normally necessary. Simple SSH Instead of Client-Server The requirements

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice