Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 71 Next »

13%
Controlling Amazon Cloud with Boto
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Claudiarndt, photocase.com
-i interact.py r-72ffb53e i-1df79851 terminated r-9b6b61d4 i-3021247f terminated >>> Listing 2 interact.py 01 # call with python -i 02 import boto.ec2 03 04 conn = boto.ec2.connect
13%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
. 21 # 22 [registries.block] 23 registries = [] These registries are called when Podman can't find an image locally or if an image doesn't contain a fully qualified registry name within an image
13%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
about unwanted DNS lookups. [Twistlock] (ALERT) /var/lang/bin/python3.7triggered a DNS resolution ofsuspicious name devsecops.cc With the correct plumbing in place, this runtime protection data
13%
mpi4py – High-Performance Distributed Python
12.11.2020
Home »  HPC  »  Articles  » 
) # end if Listing 6: Point-to-Point Output output: Rank 0 data is:  [0 1 2 3 4 5 6 7 8 9] Rank 1 Message Received, data is:  [0 1 2 3 4] Rank 2 Message Received, data is:  [5 6 7 8 9] More Complex
13%
Integrating AWS Cloud Services with Your Custom Apps
21.01.2014
Home »  Articles  » 
; however, you only need to do this work the first time. You can retrieve the required data (e.g., as in Listing 3). Listing 3: Regions 01 >>> import boto.ec2 02 >>> regions = boto.ec2.regions() 03
13%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
GSvEFc/" date = "2016-01-03" hash = "b90f268b5e7f70af1687d9825c09df15908ad3a6978b328dc88f96143a64af0f" strings: $s0 = "WshShell.Run \"dropbear.exe -r rsa -d dss -a -p 6789\", 0, false" fullword ascii
13%
FreeRADIUS for WiFi hotspots
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Tyler Olson, 123RF.com
the hash, for example, with sha1sum for SHA-1: echo -n "magazine" | sha1sum This entry in the users file, ADMIN SHA-Password := "e3d5a52968cef277f476a78124d8e05f1d558953" replaces the one above. One
13%
Safeguard and scale containers
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © cepixx, 123RF.com
as stateless processes, but databases and all persistent data need a storage back end (Figure 3) to stored the data so that they persist beyond the lifespan of the pod
13%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
-instances --image-id ami-a4dc46db --instance-type t2.micro --iam-instance-profile Name="devOps-S3Full" --user-data file://revshell.sh lets the user run a new instance along with other information gathered
13%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
be applied directly to a data stream as it occurs in the data connection. Block ciphers are the significantly more common approach. As a rule, the Advanced Encryption Standard (AES) is used today

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice