Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (442)
  • Article (140)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 59 Next »

14%
Parallelizing and memorizing Python programs with Joblib
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
)]: Done 1 out of 181 | elapsed: 0.0s remaining: 4.5s [Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s [Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2
14%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
) win 512 a:60:b2:3d:fc:af d3:7c:5b:36:4a:61 0.0.0.0.17578 > 0.0.0.0.4432: S 727135709:727135709(0) win 512 18:75:26:4c:a8:23 10:81:2a:12:e1:be 0.0.0.0.42271 > 0.0.0.0.61161: S 1071867223:1071867223(0
14%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
(dayOfYear):as.factor(wday)Monday 16.64 18 8.382 < 2e-16 *** s(dayOfYear):as.factor(wday)Saturday 11.29 18 3.307 3.00e-09 *** s(dayOfYear):as.factor(wday)Sunday 12.92 18 4.843 1.02e-13 *** --- Signif. codes: 0
14%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
/0K /s] [4137 /0 iops] [eta 00m:06s] In the example, the first job is performing a sequential read, marked as r in square brackets, while Fio hasn't initialized the second job, marked as P
14%
Configuring complex environments
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Austin Neill on Unsplash
_URL value: postgres://db_url:5431 - name: db2-container image: k8s.gcr.io/busybox env: - name: DB_URL value: postgres://db_url:5432 You can view a list of all
14%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
or check encrypted connections. After the check, the data is encrypted again and redirected to the recipient. Additionally, an E-SBC can prevent denial-of-service (DoS) attacks on the telephone system
14%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
quark | CHANGED | rc=0 >> /dev/testlv 64.00 62.67 3% 4 1% /testfs Now, to create a playbook to remove the filesystem you just created, go to the /etc
14%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
work is required: You need to modify the virtual machine’s network configuration and change the hostname. If the original virtual machine ran an SSH server, you also need to create a new SSH key
14%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables: prefix. Listing 1 iptable Rules 01 *filter 02 *filter 03 :INPUT ACCEPT [0:0] 04
14%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
authentication_algorithm pre_shared_key; 08 dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice