Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (363)
  • Article (52)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 42 Next »

29%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
instructions but still provokes an explicit warning (Figure 3). Listing 6 Too Many Characters 01 #include 02 #include 03 #define BUFSIZE 10 04 05 int main(/*@unused@*/ int
29%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
29%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
other values passed in end up in the rest array. The three dots (splats) show that the caller can pass in an arbitrary number of values. The a 1,2,3,4,5,6 statement thus would output 3,4,5,6 . If you
29%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
server.examplenet.com (192.168.5.6): icmp_seq=2. time=0.344 ms 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=3. time=0.256 ms ^C ----server PING Statistics---- 4 packets transmitted, 4
29%
Gatling load-testing tool
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by NoWah Bartscher on Unsplash
class BlazeDemoV1 extends Simulation { 08 09 var qualifiedhost = "http://blazedemo.com" 10 var proxyport = 0 11 var proxyhost = "not set" 12 13 // headers for HTTP call 14 val headers = Map( 15
29%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
://misiu.pl:8080/"; 04 05 JenkinsLocationConfiguration jlc = JenkinsLocationConfiguration.get() 06 07 jlc.setUrl(newRootURL); 08 jlc.save(); Listing 3 shows two sample YAML files used by JCasC to set up
29%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
posixaccount /etc/dirsrv/schema/10rfc2307.ldif objectClasses: ( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Standard LDAP objectclass' SUP top AUXILIARY MUST ( cn $ uid $ uidNumber $ gidNumber $ home
29%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
29%
VTP for VLAN management
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluedarkat, 123RF.com
active Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12 10
29%
Get Started with Parallel CPython
07.11.2011
Home »  HPC  »  Articles  » 
 compute(istart, iend): 06     isum = 0 07     for i in xrange(istart, iend+1): 08         isum += i**3 + 123456789*i**10 + i*23456789 09  10     return isum 11  12 if '__main__' == __name__: 13  14

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice