Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (162)
  • Article (73)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next »

26%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
:Ethernet HWaddr 08:00:27:b0:21:7e inet addr:192.168.1.85 Bcast:192.168.1.255 Mask:255.255.255.0 inet6 addr: fe80::a00:27ff:feb0:217e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU
26%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
1 4,423.19 8,100.00 8,012.09 Proxy server subscription 2 4,500.00 3,850.00 4,006.04 Management/Provisioning subscription 2
26%
Creating reports with JasperReports
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sergey Nivens, 123RF.com
mash "Power Pollen" | 2017 | 399.6 | | Grasshopper trotters, trad. Bav. | 1001 | 646.8 | | Silage sorbet | 113 | 411.3 | | Young
26%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
ways of getting data from a thing to the web, I’m going to focus on what you do once all that data is in the air heading toward you. Once connected, you can think of a device as any other provider
25%
Prowling AWS
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Dmitry Naumov, 123RF.com
available to users these days and where to find them. I recommend a visit, whatever your level of experience. The next step is cloning the repository with the git command [8] (Listing 1). As you can see
25%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
in the format Listing 1 Perl Example Client 01 #!/usr/bin/perl 02 03 use strict; 04 use warnings; 05 use IO::Socket; 06 use Sys::CpuLoad; 07 08 my $remote_host = '192.168.56.102'; 09 my $remote
25%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
_function 02 03 import pymp 04 05 ex_array = pymp.shared.array((100,), dtype='uint8') 06 with pymp.Parallel(4) as p: 07 for index in p.range(0, 100): 08 ex_array[index] = 1 09 # The parallel print
25%
Obtain certificates with acme.sh
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Stuart Miles, 123RF.com
the certificate request: acme.sh --register-account acme.sh --issue --standalone -d www.example.com The socat tool starts a simple web server on port 80, through which the ACME server can communicate
25%
Exploring the most famous performance tool
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Lucy Baldwin, 123RF.com
with bargraphs. m Four-way toggle of memory state. Second and third state replace summary with bargraphs. l Load average toggle; toggles off the first line of the summary area
25%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
8.04 system maintained by the Metasploit project. Information Gathering Once the intruder logs in with a low-end user account, the first step is to get some information about the system and rights

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice