Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (367)
  • Article (98)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 48 Next »

24%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
information for Bob's client. After Alice has sent the request to the proxy, she receives a response of 100 Trying (2), telling her the next hop has received the request. If the Trying message fails
24%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
.0 release, including time delays between requests, XML results export, searching a domain in all sources, and virtual host verification. To issue a search (see Figure 5), use: ./theHarvester.py -l 100 -b all
24%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
: 3 selector: matchLabels: app: my-app template: metadata: labels: app: my-app spec: containers: - name: my-app image: my-org/my-app:1.0.0
24%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
relative to the data values. For example, if the difference between two numbers is 100.0, but you are working with values of 10^8, then the difference (0.001%) might not be important. It’s really up
24%
RESTful APIs in practice
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Michal Bednarek, 123RF.com
and follower data. The OAuth protocol [6] authenticates the API client, and JSON is the data format. A separate streaming API is available for real-time monitoring of tweets. If you want to use the Twitter API
24%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
.stdout.readlines() 69 # if not OK The small collection contains two longer and three short scripts (available online [6]): generate_certs_for_active_users.py creates a certificate
24%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
Start=/opt/monit/bin/monit -I -c /opt/monit/conf/monitrc 097 ExecStop=/opt/monit/bin/monit -c /opt/monit/conf/monitrc quit 098 ExecReload=/opt/monit/bin/monit -c /opt/monit/conf/monitrc reload 099 Restart=on-abnormal 100
24%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
other OpenStack services, Keystone is 100 percent written in Python. For the cloud to succeed, much communication takes place between the individual OpenStack components. But, because clouds need
24%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
any back-end software because it is provided by Vasco in the cloud (see also the “OAuth API” box). Figure 6: The online demo token by Vasco lets users
24%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
between requests, XML results export, searching a domain in all sources, and virtual host verification. To issue a search (see Figure 5), use: ./theHarvester.py -l 100 -b all -d target

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice