Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (553)
  • Article (182)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 75 Next »

24%
Rocky Linux RC 1 Now Available
04.05.2021
Home »  News  » 
 
:1 binary replacement for Red Hat Enterprise Linux and currently ships with GNOME 3.32, kernel 4.18.0-240.22.1.el8, SQLite 3.26, virt-what 1.18, samba 4.12.3, dnf 4.2, rpm 4.14, glibc 2.28, libgcc 8
24%
Black Lotus Labs Confirms Serious Flaw in Windows Subsystem for Linux
20.09.2021
Home »  News  » 
 
barriers between operating systems.” Black Lotus has identified a series of samples that were uploaded every two to three weeks, dating back to May 3, 2021, through August 22, 2021. The attacks were
24%
Importing SSH keys on AWS
05.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
DEjAhocW2hraXMIIEowIBAAKCAQEAhXo2cUYv B8/P/BP0ges6i7VJ9Oj1bDHfILtu805syqwN5J6IBcgvesthq4Xpj4zuIVsCctU5SEIkx9texM+b .... fuy3QFJdl3rM0w/ry1QDRy5WgfZsIpAQZUuCaZgZx2BavviuVcFGrd67RfP6gt2yBk7EhN0gQCN2 X5
24%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
1.1.1.1/10 scope global veth1 valid_lft forever preferred_lft forever $ ss -etn State Recv-Q Send-Q Local Address:Port Peer Address:Port ESTAB 0 0 1.1.1.1:22 1
24%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
a filter chain, assign it to the previously created firewall table, and specify where in the network stack it should be placed: nft create chain inet firewall incoming { type filter hook input priority 0
24%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
Suite (RHCS) and use CMAN as their Cluster Manager. Depending on the version you use, the implementation will look total different. The initial variant (version 1.0) included with RHEL 4 or very old
24%
StarCluster Toolkit: Virtualization Meets HPC
16.01.2013
Home »  HPC  »  Articles  » 
$ starcluster start -s 1 foocluster -n ami-999d49f0 $ starcluster get foocluster /opt/sge6-fresh . $ starcluster terminate foocluster $ starcluster start -o -s 1 -i t1.micro -n ami-e2a0058b imagehost
24%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory
24%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
/mfeilner/.openshift/express.conf ... done 20 21 Checking for git ... found git version 2.1.0 22 23 Checking common problems .. done 24 25 Checking for a domain ... feilner 26 27 Checking for applications ... none 28 29 Run 'rhc create
23%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
Manipulation The ntopng Edge (nEdge) [2] version of ntopng actively manipulates network traffic. nEdge lets you analyze network traffic at the protocol level (Layer 7) and block or restrict application

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice