Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1348)
  • Article (337)
  • News (254)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 195 Next »

9%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
or about its findings in general. The Coroot developers offer a comprehensive solution by seamlessly connecting to various pager and operations services out of the box, including PagerDuty [12] and Opsgenie
9%
A self-hosted server and site manager for WordPress
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Marek Ulliasz, 123RF.com
perspective, most options have separate controls (Figure 12). Figure 12: You can lock down tabs for users accessing site details on the front end of the site
9%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
’s IP address. Roughly, it should look something like Listing 1. The IP address of the master node is 10.1.0.250. Be sure to check that the compute nodes can ping this address. Also be sure that ntp
9%
How to query sensors for helpful metrics
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by patricia serna on Unsplash
--name flux18 --volume /var/pods/flux18/etc:/etc/influxdb:Z --volume /var/pods/flux18/data:/var/lib/influxdb:Z --net pub_net --ip 192.168.2.81 --mac-address 52:54:C0:A8
9%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
in a loop. Thus, the application can be switched to Capsicum capability mode with just two additional lines of program code: if (cap_enter() < 0) error("cap_enter: %s",pcap_strerror(errno)); The following
9%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
a step in the right direction. Authentication policies can, to a certain extent, help limit the attack surface for brute force. For example, a Tier 0 account cannot be blocked by a brute-force attack
9%
PC over IP
03.09.2013
Home »  Articles  » 
 
and easily with the ping scan method (-sP ; Listing 1). Listing 1: IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0.190) Nmap
9%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
an integer argument, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments
9%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
machine or flood a network). Even from the default view, with iftop -i eth0 where -i declares which interface you want to monitor, you can simply press the f key to enter one of the many filters
9%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments, like its Python

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 195 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice