Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (322)
  • Article (122)
  • News (43)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 49 Next »

41%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Dec 9 09:11 microsoft.gpg which means only the root user can read and write to the file. The next step sets up the correct Apt package repository entry, which is ideal for security updates, new
41%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
, so the other must be the injected sidecar. A full description of one of these pods (Figure 7) shows that the Istio sidecar is indeed present: $ kubectl describe pod wordpress-77f7f9c485-k7tt9
41%
Critical Linux Kernel Bug Discovered
20.01.2016
Home »  News  » 
 
Security researchers at Perception Point Software have identified a 0-day privilege escalation vulnerability in the Linux kernel. According to the report, the problem has existed since 2012
41%
Linux May Drop Support for i486 Architecture
31.10.2022
Home »  News  » 
 
support back in 2012. Maybe it's time to get rid of i486 support in 2022?” Linux kernel 6.1, out this year, will be a Long Term Support (LTS) kernel, says Evenden, but if Torvalds prevails, it could
41%
OpenStack Trove for users, sys admins, and database admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © cheskyw, 123RF.com
intervention by the user. The command: trove create lm-slave 1 --size 2 --slave_of ae427c76-eee3-11e6-802a-00215acd73e2 would add a slave node named lm-slave of flavor 1 to the database with the ID ae427c76
41%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
on Information, Computer and Communications Security, 2010. [7] A More Secure Cloud for Millions of Google Apps Users [8] A. Haeberlen, “A Case for the Accountable Cloud,” Proceedings of the 3rd ACM SIGOPS
41%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
  Model TS-251 DS-214 N5550 ReadyNAS RN31400 Manufacturer QNAP Inc. Synology Thecus Netgear Operating System QTS 4.1.1 (Linux 3
41%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
the simple text file hpc_001.html : [laytonjb@home4 TEMP]$ ls -s total 7288  196 hpc_001.html  7092 MFS2007.pdf [laytonjb@home4 TEMP]$ 7z a -p hpc_001.html.7z hpc_001.html   7-Zip [64] 9.20  Copyright (c
41%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
the way back to well before Sinclair C5s were the rage – 1971 or so – an early edition of Unix incorporated a command called mail. So nascent was this embryonic operating system that it couldn't speak
41%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
protocols, for example, http-brute, oracle-brute, and snmp-brute. default These are standard scripts that are used if you run Nmap with the -sC or -A options. discovery

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 49 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice