Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (539)
  • Article (129)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 68 Next »

18%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
node1 192.168.56.101 (eth1) 10.0.2.1 (eth0) node2 192.168.56.102 (eth1) 10.0.2.2 (eth0) node3 192.168.56.103 (eth1) 10.0.2.3 (eth0
18%
Verifying your configuration
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kritiya Sumpun, 123RF.com
://www.freedesktop.org/wiki/Software/systemd/ContainerInterface/ STOPSIGNAL SIGRTMIN+3 CMD ["/bin/bash"] Listing 2 setup_goss.sh #! /bin/bash set -uo pipefail GOSSVER='0.3.18' GOSSCDIR='/etc/goss' RQRDCMNDS="chmod echo sha256sum tee wget" pre
18%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
18%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
. In Python 2.3, the logging module [3] was finally added to the standard library, so assuming you have Python in place, you have nothing to install. To use the module, import it at the start of a script, like
18%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
to Virtualization.'' Alternatives to Virtualization According to one very nicely written page [3], KVM will still work without the hardware extensions, but it will be much slower. It is also possible ... 0 ... 0
18%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
-nodepool1-39945963-vmss000000 Ready agent 14m v1.27.7 10.224.0.4 Ubuntu 22.04.3 LTS 5.15.0-1051-azure containerd://1.7.5-1 You can see an internal IP address, the version of the Ubuntu Linux node
18%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
Shell 2.0, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
18%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
update after appropriate testing. Image tags let you to specify only the major or minor releases (e.g., mariadb:10 or mariadb:10.8.3). However, a setup like this with a "generic" database server that many
18%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
traffic normally unavailable because of layer 2 switching. Arpspoof [3] is much simpler than ettercap for redirecting packets: # arpspoof -i eth0 -t host Specifying the interface is optional
18%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
into a ZIP archive: zip Ubuntu12041.zip /boot/System.map-3.2.0-29-generic module.dwarf This kernel profile should then be moved to the volatility/plugins/overlays/linux/ directory. The analysis feature

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice