Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (266)
  • News (32)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 104 Next »

31%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
, you can quickly become confused when you hear about K3s [2], k0s [3], minikube [4], Microkubes [5], and the many other variants. These names relate to K8s distributions, all of which enrich the vanilla
31%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
scanner’s -sL option (nmap -sL ) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed. In addition to these standard DNS tools, a pair ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
31%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
/loadavg/ [3]: 1.00 0.97 0.94 1/1279 7743 The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last process ID (PID
31%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
wrote on Lmod back in 2018, you will see a discussion about the three commands to run: $ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh $ sudo ln -s /usr
31%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
                               3.105ubuntu1                add and remove users and groups ii  ant                                   1.7.0-3                     Java based build tool like make ii  antlr
31%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... by normal users. But there’s a flaw – although the mechanism is still reasonably easy to enable (in the new v0.56, three lines in /etc/ceph/ceph.conf are all it takes), activating CephX will make many ... We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... The RADOS Object Store and Ceph Filesystem: Part 3
31%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
_anchor_tag == 1 or (#s_uri > 0 and #s_uri < 3)) 18 } You can also use Yara to monitor applications, rather than simply files. For example, using the strings command, I reviewed the contents of a database
31%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
.sin(periods * 2 * np.pi * t) 12 return max(value, 0.0) 13 else: 14 value = np.sin(periods * 2 * np.pi * t) 15 return max(value, 0.0) 16 17 # building the data vector 18 my_data = [] 19 i = 0 20 while
31%
Creating a private Docker registry
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Dayne Topkin on Unsplash
84c5f6e03bf0 45 hours ago 104MB registry 2 2d4f4b5309b1 2 months ago 26.2MB $ docker tag redis:latest 192.168.1.48:5000/redis:latest and check
30%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
quark | CHANGED | rc=0 >> /dev/testlv 64.00 62.67 3% 4 1% /testfs Now, to create a playbook to remove the filesystem you just created, go to the /etc

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 104 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice