Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (570)
  • Article (147)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 76 Next »

16%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
.9 Ready 3h v1.6.2 Listing 2 Kubernetes Node Data Structure in YAML $ kubectl get node 10.126.22.9 -o yaml apiVersion: v1 kind: Node metadata: creation
16%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
and then rewrites the Contact header to contain the publicly reachable NAT gateway socket. Listing 3 shows an Invite request that has been modified by the SIP proxy: 18.17.16.15 is the gateway's public address; 20.22
16%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
such as SSH, FTP, IMAP, POP3, Sendmail, and others are susceptible to brute force and dictionary attacks, because username/password combinations are inherently weak protections. Fail2ban allows you to set up
16%
Whitepaper: AMD “Bulldozer” Architecture
10.11.2011
Home »  HPC  »  Vendors  »  AMD  » 
 
. • 6 and 8 cores available • 1/2 socket; 2 memory channels • Less than 5 watts per core3 • Easily integrated into existing AMD Opteron 4000 Series platforms
16%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
.0 2.2.x. 2.6.30 through 2.6.35 Debian 6 (Squeeze) 2.3.x. 2.6.36 through 3.0 Ubuntu 11.10 2.4.x. 3.1. openSUSE 12.1 2.5.x. 3
16%
Building a port scanner in Python
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Leo Blanchette, 123RF.com
installed on your system. If Python is not installed, you can install it with: sudo apt install python3 With VS Code and the necessary extensions set up, you are now ready to start developing your port
16%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
    0 349.7M  1 loop /snap/gnome-3-38-2004/143 loop4    7:4    0 485.5M  1 loop /snap/gnome-42-2204/120 loop5    7:5    0   497M  1 loop /snap/gnome-42-2204/141 loop6    7:6    0  81.3M  1 loop
16%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
17 %description 18 Custom SELinux policy module. 19 20 %prep 21 if [ ! -d custom-selinux-policy ]; then 22 mkdir custom-selinux-policy 23 fi 24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
16%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
gas prices. The company announced its VMware Ready Desktop Solutions program on June 22. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
16%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
The Linux kernel already contains a variety of packet filters, starting with ipfwadm and followed by ipchains and iptables. Kernel 3.13 saw the introduction of nftables [1], which uses the nft tool

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 76 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice