Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (318)
  • Article (131)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 46 Next »

28%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
Fn::Base64: 20 Fn::Join: 21 - '' 22 - 23 - "{\n" 24 - '"bucket"' 25 - ' : "' 26 - Ref: S3Bucketname 27
28%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
 => SOCK_STREAM)     or die "Couldn't connect to $remote_host:$remote_port: $@ \n";     while() {  my @lavg = Sys::CpuLoad::load();  my $ts=time();  print $socket "system.loadavg_1min $lavg[0] $ts\n";  print
28%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
Availability 01 Use IO::Select 02 03 $select = IO::Select->new(); 04 05 $select->add($socket1); 06 $select->add($socket2); 07 $select->add($socket3); 08 $select->add($socket4); 09 10 @ok_to_read = $select
28%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
on a vulnerable pod and then it will enumerate all the secrets from the cluster (Figure 2): kubeletctl exec "whoami" -c container_name -p pod_name -n namespace --server 3.71.72.105 -i kubeletctl scan token
28%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
. An alternative to Docker is CRI-O [3], which now officially supports Kubernetes. To use it on Ubuntu 18.04, you need to run the commands in Listing 1. As a first step, you set several sysctl variables; the actual
28%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
.13.134.52):            Not shown: 994 filtered ports            PORT    STATE  SERVICE VERSION            22/tcp  open   ssh     OpenSSH 4.3 (protocol 2.0)            25/tcp  closed smtp            53/tcp  open   domain  ISC BIND 9.3
28%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L3 caches across all cores or shared L2 and L1 caches across
28%
Netcat – The Admin’s Best Friend
20.08.2012
Home »  Articles  » 
 
examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, entering # nc -s 1.2.3.4 examplehost.tld 8181 will connect to examplhost
28%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
seconds, for example: # nc -p 16000 -w 30 examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter: # nc -s 1.2.3
28%
Nagios alerts implemented via VoIP
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Zentilia, 123RF.com
well. Of the available clients, PJSUA [3] turns out to be the best choice. PJSUA is the PJSIP reference implementation, and it comprises a function library for SIP, RTP, STUN, and some other Vo

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice