Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (203)
  • Article (95)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

28%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
and database. Becoming an 3l33t Haxx0r A fully operational database-driven Mutillidae II application is now ready, against which you can practice your ethical hacking skills. Before going a little deeper
28%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
{ "$schema" : "https://aka.ms/winget-packages.schema.2.0.json", "CreationDate" : "2024-03-05T03:41:14.411-00:00", "Sources" : [ { "Packages" : [ { "PackageIdentifier" : "Microsoft.VisualStudio.2022.Community
28%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
something like: $ cat cloudnativesecurity.cc -----BEGIN CERTIFICATE----- MIIF1zCCBL+gAwIBAgIRAK7AdUDa5C4Y1o6SSOX4aC0wDQYJKoZIhvcNAQEL ... Step 3 Now that you have the certificate you want to trust saved
28%
GNU Parallel: Multicore at the Command Line with GNU Parallel
04.11.2011
Home »  HPC  »  Articles  » 
command [3], you can use GNU parallel as a drop-in replacement and start executing many things at once right away. Surprisingly, the parallel command was not packaged for Fedora 13 or the Fedora Rawhide
28%
News for Admins
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
 
Marketplace (https://aws.amazon.com/marketplace/pp/prodview-xe2snnbtbhdpc?sr=0-1&ref_=beagle&applicationId=AWSMPContessa). Additionally, CIQ is now offering enterprise-level support (https ... In the news: CIQ Offers Long-Term Support for Rocky Linux on AWS; Apple's PQ3 Brings Post-Quantum Security to iMessage; Google Open Sources Magika File-Type Detection System; Microsoft Announces Sudo
28%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
, or spot purchase of resources. Generally, the cost for on-demand EC2 instances are as follows: Quadruple Extra Large Instance is US$ 1.3/hour (US$ 0.33/core per hour), Eight Extra Large Instance is US$ 2
28%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
in the neighbor cache. Display the contents of this cache using the command: netsh interface ipv6 show neighbor If you are already in the right context, simply type show neighbor, or the short form sh n (Figure 3
28%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles. Big Deal? AWS IAM [3] lets you manage access to AWS
28%
Combining containers and OpenStack
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Dmitriy Melnikov, Fotolia.com
stack17987 0.1 1.2 224984 49332 pts/35S+15:450:19 /usr/bin/python /usr/bin/magnum-api stack18984 0.0 1.4 228088 57308 pts/36S+15:450:06 /usr/bin/python /usr/bin/magnum-conductor $ Kubernetes, Mesos
28%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
Version 3.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice