Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (174)
  • Article (33)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 Next »

14%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
seq_timeout = 10 08 tcpflags = syn 09 command = /usr/sbin/iptables -A INPUT -s \ %IP% -p tcp --dport 22 -j ACCEPT 10 11 [closeSSH] 12 sequence = 9000
14%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database. Figure 1: An image scan with Trivy generates a long list of vulnerabilities
14%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
) (None, 32, 32, 32) 9,248 max_pooling2d (MaxPooling2D) (None, 16, 16, 32) 0 conv2d_2 (Conv2D) (None, 16, 16, 64) 18,496 conv2d_3 (Conv2D
14%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
": "node bin/hello-cdk.js", 03 "context": { 04 "cidr_by_env": { 05 "dev": "10.100.0.0/16", 06 "qa": "10.200.0.0/16", 07 "prod": "10.300.0.0/16" 08 }, 09 "max_azs": { 10
14%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [3]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common
14%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
startserver() 05 WebSockets.listen("127.0.0.1", PORT) do ws 06 for msg in ws 07 d = Meta.parse(JSON.parse(msg)["s"]) 08 WebSockets.send(ws, """

You picked $d

14%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
more. One interesting Kubernetes subproject named kube-state-metrics [22] retrieves information relating to existing objects from the Kubernetes API and generates new metrics: kubectl create -f 08-kube
14%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
13 respawn 14 respawn limit 10 5 15 16 pre-start script 17 $DAEMON -t 18 if [ $? -ne 0 ] 19 then exit $? 20 fi 21 end script 22 23 exec $DAEMON Listing
14%
Easy configuration management with Puppet
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Warangkana Bunyarittongchai, 123RF
says: $ puppet apply .pp notice: Scope(Class[main]): Let's build a server! notice: Finished catalog run in 0.01 seconds Next, create a simple and largely useless file in the same script, drop
14%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
to 4.2GHz) 4MB L2 cache 384 Radeon cores 800MHz GPU clock speed DDR3 1866MHz memory 100W Putting both the CPU and the GPU on the same processor allows the GPU to have access to system

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice