Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (368)
  • Article (116)
  • News (35)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 53 Next »

10%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
:\Users\khess> $Host Name : ConsoleHost Version : 2.0 InstanceId : ccbc6963-c33e-4848-a8e5-aa1ccaf7d65c UI : System
10%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
address = 192.168.1.250 eth0:0 17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21 use_regex = 0 22 load_monitor = rup 23
10%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
Module 3+ (image credit: SparkFun Electronics; CC BY 2.0 DEED). The initial carrier board was called the Compute Module 4 IO Board and had connectors for HDMI, Gigabit Ethernet, USB, microSD, PCI
10%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
are collected: # Hadolint # template: docker hadolint_nb_reports=0 for file in ${DEFECTDOJO_HADOLINT_REPORTS} do if [[ $(expr "$file" : '.*\*.*') == 0 ]] && [[ -f "$file
10%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
19 ******************************************/ 20 module "gke" { 21 source = "terraform-google-modules/kubernetes-engine/google" 22 project_id = var.project_id 23
10%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
hardware support [7]. I am using Ubuntu 22.04 (Jammy) for this test in the original us-east-1 availability zone. $ aws ec2 run-instances --image-id ami-0ea1c7db66fee3098 --region us-east-1 --key federico
10%
Zero-Management Databases
02.10.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
the launch of the database: DNS Name = ec2-11-22-33-44.eu-west-1.compute.amazonaws.com, Port = 3158 DNS Name = ec2-22-33-44-55.eu-west-1.compute.amazonaws.com, Port = 3158 DNS Name = ec2-33-44-55-66.eu-west-1
10%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
10%
Interprocess communication essentials in Perl
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Carsten Reisinger, 123RF.com
waitpid(-1, 0); 20 } else { 21 close READFROMCHILD; 22 close WRITETOCHILD; 23 $thisdata = ; 24 print "The child process read $thisdata"; 25 print WRITETOPARENT "The child process
10%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice