Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (770)
  • Article (269)
  • News (36)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 108 Next »

20%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
, you can quickly become confused when you hear about K3s [2], k0s [3], minikube [4], Microkubes [5], and the many other variants. These names relate to K8s distributions, all of which enrich the vanilla
20%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
scanner’s -sL option (nmap -sL ) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed. In addition to these standard DNS tools, a pair ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
20%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
wrote on Lmod back in 2018, you will see a discussion about the three commands to run: $ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh $ sudo ln -s /usr
20%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
                               3.105ubuntu1                add and remove users and groups ii  ant                                   1.7.0-3                     Java based build tool like make ii  antlr
20%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... by normal users. But there’s a flaw – although the mechanism is still reasonably easy to enable (in the new v0.56, three lines in /etc/ceph/ceph.conf are all it takes), activating CephX will make many ... We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... The RADOS Object Store and Ceph Filesystem: Part 3
20%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
_anchor_tag == 1 or (#s_uri > 0 and #s_uri < 3)) 18 } You can also use Yara to monitor applications, rather than simply files. For example, using the strings command, I reviewed the contents of a database
20%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
1, 47 MPI_LONG, 48 0, 49 2, 50 MPI_COMM_WORLD); 51 } 52
20%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
.sin(periods * 2 * np.pi * t) 12 return max(value, 0.0) 13 else: 14 value = np.sin(periods * 2 * np.pi * t) 15 return max(value, 0.0) 16 17 # building the data vector 18 my_data = [] 19 i = 0 20 while
20%
Creating a private Docker registry
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Dayne Topkin on Unsplash
84c5f6e03bf0 45 hours ago 104MB registry 2 2d4f4b5309b1 2 months ago 26.2MB $ docker tag redis:latest 192.168.1.48:5000/redis:latest and check
19%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
| elapsed: 0.0s remaining: 4.5s [Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s [Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice