Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (292)
  • Article (57)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 35 Next »

11%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
.4' 02 services: 03 keycloak: 04 container_name: keycloak 05 image: quay.io/keycloak/keycloak:17.0.1 06 ports: 07 - 8080:8080 08 environment: 09 - KEYCLOAK
11%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
:sda]RKBytes [DSK:sda]Writes 21 [DSK:sda]WMerge [DSK:sda]WKBytes [DSK:sda]Request [DSK:sda]QueLen \[DSK:sda]Wait [DSK:sda]SvcTim [DSK:sda]Util 22 20120310 13:39:10 sdb 0 0 0 2 4 24 12 0 12 2 0 sda 0 0 0 0 0 0 0 0 0 0
11%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
VPC: 04 Type: AWS::EC2::VPC 05 Properties: 06 CidrBlock: 07 Ref: VPCNet 08 Tags: 09 - Key: Name 10 Value: 11 Ref: VPCName 12 13 Forti
11%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
== 0: 08 data = { 'key1' : [10,10.1,10+11j], 09 'key2' : ('mpi4py' , 'python'), 10 'key3' : array([1, 2, 3]) } 11 else: 12 data = None 13 # end if 14 15 data = comm
11%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
rule phishing_pdf { 02 03 meta: 04 author = "James Stanger" 05 last_updated = "2017-09-12" 06 category = "phishing" 07 confidence = "high" 08 threat_type = "phishing exploit" 09 description
11%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Formation and Terraform in this article as points of comparison, the list of other tools that can provision infrastructure is long: Troposphere [12], Sceptre [13], Bash scripts, custom apps leveraging SDKs, Ansible [14
11%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
Hub: https://github.com/tutao/tutanota Tutanota and Outlook: http://blog.tutanota.de/email-encryption-outlook-tutanota-starter/2014/08/12/ ProtonMail: https://protonmail.ch Funding ProtonMail: https
11%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
=/var/log/one/accounting.log 04 05 case "$1" in 06 "on"|"off") 07 mode=$1 08 shift 09 ;; 10 *) 11 echo "$0 error: wrong mode." >&2 12 exit 1 13 ;; 14 esac 15 16 if [ "$1
11%
Listing 4
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
                                              | 119 kB     00:00 (6/19): glib2-2.22.5-6.el6.i686.rpm                                              | 1.1 MB     00:00 (7/19): libX11-1.3-2.el6.i686.rpm
11%
RESTful APIs in practice
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Michal Bednarek, 123RF.com
_consumer_secret>" 06 config.access_token = "" 07 config.access_token_secret = "" 08 end 09 10 user = client.user("23Cent") 11 puts user.name 12 13 def collect

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice