Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (85)
  • Article (36)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 13 Next »

14%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
, you should see the client config file ssh_config, which I'll get to a little later. If you've just installed the SSH server and want to be sure that it's listening, you can use the command lsof -i :22
14%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
           47 k  pixman                     x86_64 0.38.4-2.el8                          appstream       256 k  slurm-contribs-ohpc        x86_64 22.05.2-14.1.ohpc.2.6                 OpenHPC-updates  22 k  slurm
14%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
47 k pixman x86_64 0.38.4-2.el8 appstream 256 k slurm-contribs-ohpc x86_64 22.05.2-14.1.ohpc.2.6 OpenHPC-updates 22 k slurm
14%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
. The problematic compression is disabled. Listing 1 Configuration Example SSLProtocol -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2 SSLHonorCipherOrder on SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:DHE
14%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
14%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
(One-by-One) 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my_record; 14 int counter_limit; 15
14%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
/lib/sheepdog root 582 581 0 13:13 ? 12:00:00 AM sheep -p 7000 /var/lib/sheepdog # grep sheep /proc/mounts /dev/sdb1 /var/lib/sheepdog ext4 rw,relatime,data=ordered 0 0 # grep sheep /etc/fstab /dev
14%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
be no question of disabling the legacy algorithm for the time being. However, disabling MD5 signatures is something that you can (and should) do today. You can enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2
14%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
"SubnetMax": "10.99.0.0", 07 "Backend": { 08 "Type": "udp", 09 "Port": 7890 10 } 11 } 12 [...] At first glance, this concept looks robust and simple
14%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"TracingConfig": { 17 "Mode": "PassThrough" 18 }, 19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc", 20 "Description": "", 21 "CodeSize": 432, 22 "FunctionArn": "arn

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice