Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (506)
  • Article (151)
  • News (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 68 Next »

24%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
patch libctf-nobfd0 perl libctf0 perl-modules-5.32 liberror-perl runc libgdbm-compat4 tini libintl-perl Next, you need
24%
Shared Storage with NFS and SSHFS
12.09.2018
Home »  HPC  »  Articles  » 
, the first step is to specify the filesystems (directories) that are to be exported to the compute nodes. The /etc/exports file lists the filesystems and the permissions, such as: /usr/local   192.168.0.1(ro
24%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
, the first step is to specify the filesystems (directories) that are to be exported to the compute nodes. The /etc/exports file lists the filesystems and the permissions, such as: /usr/local 192.168.0.1(ro
24%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
_HOME=/ephemeral/jenkins 10 11 # for main web interface: 12 EXPOSE ${HTTP_PORT} 13 14 ENV JENKINS_HOME=${JENKINS_HOME} 15 ENV CASC_JENKINS_CONFIG=/jcasc_config 16 17 COPY jcasc_config/* ${CASC_JENKINS_CONFIG}/ 18 19 RUN mkdir
24%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real
24%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
and the other on all IPv6 IP addresses. Listing 1 Checking Open Ports chris@DebianBox:~# lsof -i :22 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sshd 3328 root 3r IPv4 33323 0t0 TCP *:ssh
24%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker's most popular tools. This article presents real
24%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
of these is node_exporter [12], which reads and provides operating system metrics such as memory usage and network load. Meanwhile, a number of exporters [13] exist for a wide range of protocols and services
24%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
ENTRYPOINT ["gcloud","beta","emulators","pubsub","start","--project=demo"] CMD ["--host-port=0.0.0.0:8085"] Now, create the script in Listing 2 for the Pub/Sub service to create a topic
24%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
Flow, Microsoft Cognitive Toolkit (commonly referred to as CNTK), Theano, and PlaidML. By version 2.4, Keras only supported TensorFlow. In version 3.0 and subsequent versions, Keras once again supported multiple

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice