Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (343)
  • Article (103)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 45 Next »

10%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
20G 22,38080,52812,58080 kafka 3 weaveworks/ignite-ubuntu:20.04 weaveworks/ignite-kernel:5.12.18 2 2G 20G 22,2181,8080,9092,38080,52812,58080 spark 3 weaveworks
10%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
are over i = 2,n − 1 and j = 2,n −1. Here is how you can write the iteration over the domain using array notation: a(2:n-1,2:n-1) = 0.25 * &     (a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
10%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
files from 1991 on my system and files from the late 1980s on floppy disks (once a pack rat, always a pack rat). With the second approach – doing the migration for the users – migrating data takes a bit
10%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
verify these checksums: import hashlib def calculate_checksum(log_entry): return hashlib.sha256(log_entry.encode('utf-8')).hexdigest() # Example log entry log_entry = "2024-06-15 12:00:00 Failed login
10%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
and interacts with a remote filesystem as though it were local (i.e., shared storage). It uses the SSH File Transfer Protocol (SFTP) between hosts, so it’s as secure as SSH. (I’m not a security expert, so I can
10%
Creating an SFTP jail
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Juan Manuel Ordonez, 123RF.com
-local 04 bash#> 05 bash#> pkgadd -d tcp_wrappers-7.6-sol10-sparc-local 06 07 The following packages are available: 08 1 SMCtcpdwr tcp_wrappers 09 (sparc) 7.6 10 11 Select package(s
10%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
_HOME=/ephemeral/jenkins 10 11 # for main web interface: 12 EXPOSE ${HTTP_PORT} 13 14 ENV JENKINS_HOME=${JENKINS_HOME} 15 ENV CASC_JENKINS_CONFIG=/jcasc_config 16 17 COPY jcasc_config/* ${CASC_JENKINS_CONFIG}/ 18 19 RUN mkdir
10%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
for an intrusion attempt. Figure 1: PC1 sends out a data frame with the destination address ABCD.EF00.0004. The switch receives it at port 1 and then searches
10%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
the dominant hypervisor system; for example, Red Hat’s enterprise virtualization solution is based on it. Red Hat seeks to grab some of VMware’s market share with its RHEV (Red Hat Enterprise Virtualization
10%
Routing with Quagga
19.02.2013
Home »  Articles  » 
on routers by Cisco or Juniper. However, Quagga gives IT administrators the option of participating in the world’s largest group of routers – with a Linux computer. The Quagga project originated with the Zebra

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 45 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice