Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (193)
  • Article (77)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 27 Next »

18%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
_record" "mywebapp" { 07 domain = "${var.cloudflare_domain}" 08 name = "terraform" 12 proxied = true 11 ttl = 120 10 type = "A" 09 value = "${digitalocean_droplet.mywebapp.ipv4_address}" 13
18%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
dbd3f5990de980fa67d56ef629063a6ab4d47de05a2905a7 The hash ID of the sandbox Pod is returned, denoting success. Note that eventually Kubernetes will apparently delete this Pod after some housekeeping
18%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
use generic-service 21 host_name w2k12srv 22 service_description Memory Usage 23 check_command check_nt!MEMUSE!-w 80 -c 90 24 } 25 define service{ 26
18%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget
18%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
if z(i) depends on a previous value, as in the following: do i = 2,n z(i) = z(i-1)*2 enddo As written, you can't generally parallelize the loop because of data dependency [4]. This dependency
18%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
, it is already in the /etc/apache2/ports.conf file; openSUSE 12.3 uses /etc/apache2/listen.conf, and on CentOS it's in /etc/httpd/conf.d/ssl.conf. If necessary, remove the hash signs (#) that comment out
18%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real
18%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
install kopano-webapp # exit ### If you have the Community Packages $ wget https://download.kopano.io/community/webapp%3A/webapp-4.2.2860%2B1697.1.12a4e21-Ubuntu_18.04-all.tar.gz $ tar xfz webapp-4.2.2860+1697.1.12
18%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"RevisionId": "aa63-b5c0-4ec2-a5e99", 11 "MemorySize": 128, 12 "Version": "$LATEST", 13 "Role": "arn:aws:iam::XXXXX:role/bashFunctionRole", 14 "Timeout": 3, 15 "Runtime": "provided", 16
18%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
[laytonjb@n0001 ~]$ module avail ------------------------------- /opt/Modules/versions ------------------------------ 3.2.9 --------------------------- /opt/Modules/3.2.9/modulefiles ... Warewulf Cluster Manager – Part 3

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice