Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (227)
  • Article (53)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 29 Next »

22%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
public_key = "${file("${var.ssh_pub_key}")}" 07 } 08 resource "digitalocean_droplet" "mywebapp" { 09 image = "docker-16-04" 10 name: guest 11 region = "fra1" 12 size = "512mb" 13 ssh
22%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
. /app 09 WORKDIR /app 10 ENV NODE_ENV production 11 RUN yarn install 12 13 CMD ["node", "index.js"] If Docker Engine is not installed on your machine, before building a local docker image you can
22%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-256-cbc; 07 } 08 policy pfs2-aes256-sha1 { 09 perfect-forward-secrecy { 10 keys group2; 11 } 12 proposals aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind
22%
open64
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
| 4.3 MB 00:02 (2/2): nss-softokn-freebl-3.12.9-11.el6.i686.rpm | 115 kB 00
22%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
. The problematic compression is disabled. Listing 1 Configuration Example SSLProtocol -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2 SSLHonorCipherOrder on SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:DHE
22%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
_DATA=$1 06 07 # This is the Event Data 08 echo $EVENT_DATA 09 10 # Example of command usage 11 EVENT_JSON=$(echo $EVENT_DATA | jq .) 12 13 # Example of AWS command that's output will show up
22%
Small-board computers
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Author, 123RF.com
Galileo Yocto Linux, VxWorks (RTOS), Windows Intel Quark X1000 Single 32-bit Intel Pentium (x86) @400MHz Integrated Intel GPU   256 MB DDR3, 512KB embedded SRAM, 8
22%
Creating Virtual SSDs
21.01.2020
Home »  HPC  »  Articles  » 
local server machine (Listing 1). In this example, the four drives sdb to sde in lines 12, 13, 15, and 16 will be used to create the NVMe target. Each drive is 7TB, which you can verify
22%
Building a virtual NVMe drive
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © lassedesignen, 123RF
local server machine (Listing 1). In this example, the four drives sdb to sde in lines 12, 13, 15, and 16 will be used to create the NVMe target. Each drive is 7TB, which you can verify
22%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
CREATED SIZE nginx f09fe80eb0e7 12 days ago 109MB nginx latest 35640fed495c 12 days ago 109MB Backdoor Access Considering how well Docker Scan handled

« Previous 1 2 3 4 5 6 7 8 9 10 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice