Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (26)
  • Article (12)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4

25%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
/bin/ksh' user_gecos: 'AIX guest user' user_pgrp: 'staff' user_groups: 'staff' user_fsize: '-1' user_passwd: "{ssha256}06$FkFHd0q1hxVonC2a$sa1WA0G3mPNWtz2GAhUkfcQ7BkD/mNngBu0Tn2.N.cl" collections
25%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
/cmdline root=/dev/disk/by-uuid/10a83ffe-5a9f-48a2-b8cb-551c2cc6b42d resume=/dev/sda3 \ splash=silent text showopts crashkernel=128 sles:~ # /etc/init.d/boot.kdump status kdump kernel loaded
25%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11]. Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just
25%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
5221548db 58 seconds ago 5.67MB 80dc7d447a48 About a minute ago 167MB alpine 3.9 78a2ce922f86 5 months ago 5.55MB The command you really
25%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
* 10 * daemon started successfully * 11 List of devices attached 12 015d8bed0d3c0814 device If you use the commands from the SDK regularly, it makes sense to add its path, preferably like
25%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
fingerprint is: a9:90:af:81:69:fc:4f:b5:ef:6e:b5:d4:b7:cb:c6:02 laytonjb@test1 The key's randomart image is: +--[ RSA 2048
25%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
, so the other must be the injected sidecar. A full description of one of these pods (Figure 7) shows that the Istio sidecar is indeed present: $ kubectl describe pod wordpress-77f7f9c485-k7tt9
25%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny

« Previous 1 2 3 4

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice