Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (438)
  • Article (157)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 64 Next »

19%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
Running kube-proxy 1 5bf2de2a3af3c kube-proxy-b65c9 The mitigations for the above technique could be used to ensure that no containers mount docker
19%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
dictionary: Series({'a': 1, 'b': 2, 'c': 3}) In this use case, too, you can pass in a list separately as an index argument so that only those elements that exist in the index make their way from
19%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
]}) An optional index list determines the indices, as for a Series. In: DataFrame({'a': [1, 2], 'b': [3, 4]}, columns=['a', 'c'], index=['top', 'bottom']) Out: a c top 1 NaN bottom 2 NaN
19%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
exists, renaming the old one with ID sha256: f09fe80eb0e75e97b04b9dfb065ac3fda37a8fac0161f42fca1e6fe4d0977c80 to empty string Loaded image: nginx:latest With the docker images command, you can see
19%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
object O Python object A simple example from nkmk creates a float64  data type (64-bit floating-point number): import numpy as np a = np.array([1, 2, 3], dtype=np.float64
19%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
/bin/ksh' user_gecos: 'AIX guest user' user_pgrp: 'staff' user_groups: 'staff' user_fsize: '-1' user_passwd: "{ssha256}06$FkFHd0q1hxVonC2a$sa1WA0G3mPNWtz2GAhUkfcQ7BkD/mNngBu0Tn2.N.cl" collections
19%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
 to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start_time)   print(" Time taken in seconds: {0} s").format(time_taken_in_micro) If a section of code
19%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
e syscall=2 success=yes exit=3 a0=7fff67b1e9fc a1=0 a2=1fffffffffff0000 a3=3109e85ad0 items=1 ppid=7144 pid=11992 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000
19%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
is to put it in a filter: # tcpdump -n -s 1515 -c 5 -i eth1 tcp or udp or icmp This will catch only tcp , udp , or icmp . Tables 3 and 4 show you what you need to know to find all TCP packets with the SYN
19%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
/forum/#!searchin/riemann-users/metric_f/riemann-users/hd5pC7rWrUE/c70QVrnA5esJ Clojure: http://clojure.org "Clojure" by Jan Stepien, Linux Pro Magazine , issue 163, pg. 26, http://www.linuxpromagazine.com/Issues/2014/163/Clojure Introduction

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 64 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice