Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (302)
  • Article (71)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 38 Next »

19%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
shows some function call examples. Listing 1 Example Function Calls # Rounding up # 11 round(10.9) # Generate an array of numbers # [9, 8, 7, 6, 5, 4, 3, 2, 1] numbers.range(9, 1
19%
John the Ripper
22.08.2011
Home »  Articles  » 
 
:lanman passfile.txt Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2 guesses: 0 time: 1:09:25:10 (3) c/s: 10929 trying
19%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
, for a library that uses a specific compiler and MPI library, you would end up with a module names like atlas-3.10.0-opempi-1.6.2-open64-5.0 . The name is useful because it tells the user the library version
19%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
for changed files from the command line). Listing 1 Configuration File 01 { 02 "version": "3.0.0", 03 "watched": [ 04 { 05 "path": "/opt/repos", 06 "triggers": [] 07 } 08
19%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
instructions but still provokes an explicit warning (Figure 3). Listing 6 Too Many Characters 01 #include 02 #include 03 #define BUFSIZE 10 04 05 int main(/*@unused@*/ int
19%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
other values passed in end up in the rest array. The three dots (splats) show that the caller can pass in an arbitrary number of values. The a 1,2,3,4,5,6 statement thus would output 3,4,5,6 . If you
19%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
19%
Gatling load-testing tool
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by NoWah Bartscher on Unsplash
class BlazeDemoV1 extends Simulation { 08 09 var qualifiedhost = "http://blazedemo.com" 10 var proxyport = 0 11 var proxyhost = "not set" 12 13 // headers for HTTP call 14 val headers = Map( 15
19%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
://misiu.pl:8080/"; 04 05 JenkinsLocationConfiguration jlc = JenkinsLocationConfiguration.get() 06 07 jlc.setUrl(newRootURL); 08 jlc.save(); Listing 3 shows two sample YAML files used by JCasC to set up
19%
VTP for VLAN management
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluedarkat, 123RF.com
active Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12 10

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice