Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (514)
  • Article (147)
  • News (14)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 68 Next »

29%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
is thus focused on a setting that the Linux kernel has supported since version 2.6.6 [12]. Below /proc/sys/vm/swappiness is a run-time configuration option that lets you influence the way the kernel swaps
29%
Overview of cloud platforms and appliances
15.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
services [6]. Surprisingly, the Virtual Core Web GUI (Figure 4) is based on the Typo 3 Content Management System and not on a web application framework such as Ruby on Rails
29%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
-analyze security, it appears with a high score of 9.6 as UNSAFE and a shocked emoji (Figure 3). Figure 3: Starting point: The new service is completely insecure
29%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
of their toolkits. For example, you can install and use Splunk Enterprise and its Machine Learning Toolkit (Figure 6) with a trial license for up to 60 days and index up to 500MB of data per day. The software
29%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
]: A very compact implementation of DTLS (TLS is not supported), which is very easy to run on Linux or Contiki and is well tested on constrained wireless networks like 6LoWPAN. TinyDTLS is very compact
29%
Millions of MySQL Servers Exposed
06.06.2022
Home »  News  » 
 
surface (associated with IPv4 addresses) was found to be 5.7.33-36, whereas the IPv6 addresses showed version 5.5.5-10.5.12 was the most widely accessible. The most important thing admins can do to avoid
29%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched: docker.io registry
29%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
between 64-bit versions for Red Hat Enterprise and Ubuntu. After downloading the 500MB DEB file, install it in the usual way from the Ubuntu Software Center and acknowledge any errors relating
29%
Managing the Build Environment with Environment Modules
06.11.2012
Home »  HPC  »  Articles  » 
/mpi/mpich2-gnu4/bin/mpiexec $ module rm mpich2/1.4.1p1/gnu4 $ module load openmpi/1.6.2/gnu4 $ which mpiexec /opt/mpi/openmpi-gnu4/bin/mpiexec Notice how the path to mpiexec has changed with a change
29%
Protect Your Servers with Nmap
23.07.2012
Home »  Articles  » 
 
 purpose            Running: Linux 2.6.X            OS details: Linux 2.6.20-1 (Fedora Core 5)            TRACEROUTE (using port 80/tcp)            HOP RTT   ADDRESS            [Cut first seven hops

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice