Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%2222%A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (326)
  • Article (144)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 48 Next »

28%
JMeter tests loads and measures performance of static and dynamic resources
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by CHUTTERSNAP on Unsplash
is to verify the return code to ensure that the test step and the server both agree on the outcome. This verification is done by adding an assertion step that tests for a specific return code (Figure 2). Simply
28%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
a browser and SSH, in which case no other hardware is necessary (i.e., a keyboard, monitor, or mouse). The Pi is powered by a 5V micro-USB. To avoid power issues, use a power supply that provides 2.5A
28%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
-Manage: novammanage user admin rwartala This process creates an access key and a security key: export EC2_ACCESS_KEY=713211a477a154470fUU ae543346b52e30a0e export EC2_SECRET_KEY=244de6a188aa344e12UU 9521003ac756abbdf
28%
Automatic build and deploy with OpenShift and GitLab CI
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Photo by Jantine Doornbos on Unsplash
orchestration tool [8], as well as the DevOps tools for accelerated application development like source-to-image (S2I) [9], which I use in this example. To begin, you need an OpenShift cluster and a project
28%
Integrating FreeNAS with Windows Active Directory
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Parisod@Snowmelody, Fotolia.com
, snapshots, replication, and backup. Directory Options Your FreeNAS system [2] can easily integrate with your existing network directory services or use its own local user configuration. If you are running
28%
Automate complex IT infrastructures with StackStorm
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Fré Sonneveld on Unsplash
details and list executions with: st2 execution st2 execution list To limit the output to the last 10 executions, use st2 execution list -n 10 Rules are an essential tool of the StackStorm concept
28%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
be used with a curl  command and the requested URL for the n1  node information. Part of the output of the command can be seen in the dark window at the bottom. This live session lets you try different
28%
Moving data to Drupal 8
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Konstantinos Kokkinis, 123RF.com
_owners Idle 50 0 N/A pets Idle 1455 0 N/A $ drush mi pets Processed 1455 items (1455 created, 0 updated, 0 failed, 0 ignored) - done with 'pets' You might want
28%
Harden your Apache web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
disable unnecessary modules. On Debian and Ubuntu this task is quite easy thanks to the a2dismod command. Otherwise, you will have to search for the LoadModule directive. The primary candidates
28%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice