Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (431)
  • Article (158)
  • News (35)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 63 Next »

21%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
public key has been saved in eks-ssh.pub. 09 The key fingerprint is: 10 SHA256:Pidrw9+MRSPqU7vvIB7Ed6Al1U1Hts1u7xjVEfiM1uI 11 The key's randomart image is: 12 +---[RSA 4096]----+ 13 | .. ooo+| 14
21%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Number: 00282-30340-00000-AB9A5 Version: 6.3.9600 The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
21%
Warewulf Cluster Manager – Master and Compute Nodes
22.05.2012
Home »  HPC  »  Articles  » 
already installed and latest version Package redhat-rpm-config-9.0.3-34.el6.sl.noarch already installed and latest version Package rpm-build-4.8.0-19.el6_2.1.x86_64 already installed and latest version
21%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job. ... made to the benchmarks of the latest version 3.4.2 of the NPB are: added class F to the existing S, W, A, B, C, D, E added dynamic memory allocation added MPI and OpenMP programming models ... Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job.
21%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
. The required modifications are explained in the Huginn wiki [3]. The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3
21%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
64ae120c27e504088d8c2ce29a0fa7f85c The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL
21%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
/json;charset=utf-8\n\r\n\r%s" %json.dumps(obj) Lines 9 through 18 iterate against all entries of a database cursor, which the call to the find() method in line 9, generates from the queried data collection
21%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
21%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
-06f4dce9c3ae2c504" # for eu-west-3 paris 07 InstanceType: t2.small 08 AvailabilityZone: !GetAtt FortiVPCFrontNet.AvailabilityZone 09 KeyName: 10 Ref: KeyName 11 Network
21%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11]. Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 63 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice