Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (530)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 71 Next »

24%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power outage
24%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
is over and done with as soon as the message is delivered. MQTT enables a decoupled 1-to-n or 1-to-1 relationship between different devices or programs that do not specifically need to know each other
24%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
will work if the netcat listener is running as root (Figure 6). Figure 6: Adding user david with UID 0. Next, I need to give the user a password
24%
Caching with CacheFS
07.07.2020
Home »  HPC  »  Articles  » 
: idx=138 dat=0 spc=0 Objects: alc=0 nal=0 avl=0 ded=0 ChkAux : non=0 ok=0 upd=0 obs=0 Pages  : mrk=0 unc=0 Acquire: n=138 nul=0 noc=0 ok=138 nbf=0 oom=0 Lookups: n=0 neg=0 pos=0 crt=0 tmo=0 Invals : n=0 run
24%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
or write network traffic information to a file. A basic capture uses the syntax tcpdump -n -i -s where -n means tcpdump should not resolve IP addresses to domain names or port
24%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
/share/zoneinfo -type f | \ 07 grep -v 'posix|right|Etc|SystemV | \ 08 grep -i $city` 09 echo -n "Time in $1: "; TZ=`echo $z` date The first section of this code ensures that the script's argument
24%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
connections to join remote LANs through a private tunnel over the Internet. The first RFCs on IPsec were drafted during the development of IPv6 and date back to 1995. The current version is described by RFC
24%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
and maintained only by Red Hat. In more recent versions (e.g., 2.0 in RHEL 5 and Fedora Core 6 or later), the legacy CMAN implementation was replaced by an open implementation based on the Application Interface
24%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
** ** ** ** ** STATUS ** ** ** ** ** PORTS ** ** ** ** ** NAMES 314852f5a82e ** ** ** ** ** **fedora:latest ** ** "/bin/bash ** ** ** **8 seconds ago ** ** **Up 6 seconds
24%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
Mappings: - containerPort: 22 - containerPort: 2181 - containerPort: 8080 - containerPort: 9092 - containerPort: 38080 - containerPort: 52812 - containerPort: 58080 privileged: true

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice