Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (922)
  • Article (319)
  • News (106)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 136 Next »

17%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
magazine [3]. In other words, the many Cobbler system records are really the biggest problem. Just to jog your memory: Using system records, Cobbler can create an individual PXE configuration file for each
17%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
), a daily backup runs every day at 3:30am (seven snaphots are kept), and a weekly backup starts at 3:00am every Monday (four snapshots are available). Regularly running backups using cron is equally suitable
17%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
in mv ubuntu@aws:~/slow-mv$ strace -t mv 3GB.copy 3GB 19:00:09 execve("/bin/mv", ["mv", "3GB.copy", "3GB"], 0x7ffd0e7dddf8 /* 21 vars */) = 0 19:00:09 brk(NULL) = 0x55cd7d1ce000
17%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
, and there are several implementations [3]. What Happened Thus Far Figure 1 shows a typical setup with port knocking. The components involved here are the client and the server application, with a firewall to keep out
17%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
as the ability to pass roles. With those privileges, the adversary is able to escalate the privileges inside the account, run an EC2 instance, and exfiltrate information stored in a Simple Storage Service (S3
17%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
255 sec 63> 05 /pci@0,0/pci15ad,1976@10/sd@0,0 06 1. c8t1d0 S-1.0-10.00GB> 07 /pci@0,0/pci15ad,1976@10/sd@1,0 08 # 09 # zpool create mypool c8t1d0 10 # zpool status -v 11 pool
17%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Shift or – as shown here – an Ingress route for accessing the AWX service. This strategy also works with MicroK8s or K3s. You might have to adjust the Ingress definition if routers such as Traefik cannot cope
17%
Building a virtual NVMe drive
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © lassedesignen, 123RF
7 1 56008 loop1 06 7 2 56184 loop2 07 7 3 91264 loop3 08 259 0 244198584 nvme0n1 09 8 0 488386584 sda 10 8 1 1024 sda1 11
17%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
17%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
, the Raspberry Pi 3 (RPi3), is about $35, and the introduction of the Raspberry Pi Zero (Pi Zero) in 2015, set the low-end price of $5. People have been building clusters from Raspberry Pi units, starting

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 136 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice