Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (625)
  • Article (182)
  • News (20)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 83 Next »

18%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible python version = 3.11.2 (main, Feb 17 2023, 09:48:02) [GCC 8.5.0 20210514 (Red Hat 8.5.0-18)] (/usr/bin/python3.11) jinja version = 3.1.2 libyaml = False
18%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 -e package-list.txt Enter passphrase: Re-enter passphrase: Output filename is: package-list.txt.lrz package-list.txt - Compression Ratio: 2.537. Average Compression Speed:  0.000MB/s. Total time: 00:00:05.11 Listing 11
18%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
, for example, 12.34.56.78 will be allowed to connect to ALL services and not just SSH. As well as these flexible options, you can also declare old school subnets directly: sshd: 1.2.3.4/255.255.255.0 As well
18%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
with the original Raspberry Pi Model A, ranging from two to more than 250 nodes. That early 32-bit system had a single core running at 700MHz with 256MB of memory. You can build a cluster of five RPi3 nodes with 20
18%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(text) { 11 polycrypt.importKey("raw", hex2bin(encRawKey)).oncomplete = function(e) { 12 var key = e.target.result; 13 polycrypt.encrypt(encAlg, key, str2bin(text)).oncomplete = function(e) { 14 var
18%
AlmaLinux OS 8.5 Now Available
16.11.2021
Home »  News  » 
 
), PHP (7.4.19), Node.js (16), NGINX (1.20), Squid (4.15), Mutt (2.0.7), GCC (11), LLVM (12.0.1), Rust (1.54.0), and new repositories for ResilientStorage and Plus. Find out more by reading the full
18%
Configuring X Window input and output devices
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ilya lix on Unsplash
1: +DP-2-2 1080/510x1920/287+0+0 DP-2-2 2: +DP-2-3 1920/598x1080/336+1080+0 DP-2-3 You can use xrandr -q to see which modes the individual devices support. You can then set the desired mode
18%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77 22} 13 $s_anchor_tag = "0 and (#s
18%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
that assumes a Xubuntu Desktop 12.04.4 LTS instance. If you're not familiar with R, the R Project for Statistical Computing states: "R is a free software environment for statistical computing and graphics
18%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
under the Mozilla Public License (MPL) v2.0 [7]. Visibility into the deployment state. It exposes its state to inspection (CloudFormation does not expose its state in any way, although it recently

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice