Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (536)
  • Article (143)
  • News (14)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 70 Next »

18%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
of their toolkits. For example, you can install and use Splunk Enterprise and its Machine Learning Toolkit (Figure 6) with a trial license for up to 60 days and index up to 500MB of data per day. The software
18%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
]: A very compact implementation of DTLS (TLS is not supported), which is very easy to run on Linux or Contiki and is well tested on constrained wireless networks like 6LoWPAN. TinyDTLS is very compact
18%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
-analyze security, it appears with a high score of 9.6 as UNSAFE and a shocked emoji (Figure 3). Figure 3: Starting point: The new service is completely insecure
18%
Millions of MySQL Servers Exposed
06.06.2022
Home »  News  » 
 
surface (associated with IPv4 addresses) was found to be 5.7.33-36, whereas the IPv6 addresses showed version 5.5.5-10.5.12 was the most widely accessible. The most important thing admins can do to avoid
18%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched: docker.io registry
18%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
between 64-bit versions for Red Hat Enterprise and Ubuntu. After downloading the 500MB DEB file, install it in the usual way from the Ubuntu Software Center and acknowledge any errors relating
18%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
 purpose            Running: Linux 2.6.X            OS details: Linux 2.6.20-1 (Fedora Core 5)            TRACEROUTE (using port 80/tcp)            HOP RTT   ADDRESS            [Cut first seven hops
18%
Give your servers the once over with Nmap
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© ragsac, 123RF.com
closed auth Device type: general purpose Running: Linux 2.6.X OS details: Linux 2.6.20-1 (Fedora Core 5) TRACEROUTE (using port 80/tcp) HOP RTT
18%
Managing the Build Environment with Environment Modules
06.11.2012
Home »  HPC  »  Articles  » 
/mpi/mpich2-gnu4/bin/mpiexec $ module rm mpich2/1.4.1p1/gnu4 $ module load openmpi/1.6.2/gnu4 $ which mpiexec /opt/mpi/openmpi-gnu4/bin/mpiexec Notice how the path to mpiexec has changed with a change
18%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
of many cores and many nodes, so why not use these cores to copy data? There is a project to do just this: DCP [5] is a simple code that uses MPI [6] and a library called libcircle [7] to copy a file

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice