Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (54)
  • Article (15)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

23%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
_DATA=$1 06 07 # This is the Event Data 08 echo $EVENT_DATA 09 10 # Example of command usage 11 EVENT_JSON=$(echo $EVENT_DATA | jq .) 12 13 # Example of AWS command that's output will show up
23%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched: docker.io registry
23%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
= kvmVM #specify the name 02 CPU = 1 # How many CPUs required? 03 MEMORY = 512 # RAM in MB 04 OS = [ 05 KERNAL = "/boot/vmlinuz-2.6.32-24-generic", # Kernel to use 06
23%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
prompts you for your access and secret key (Figure 6). As an Amazon user, you are given both on registering with the service [12]. Next, click on your own name in the top right corner, select Security
23%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
(msg.payload)) 07 08 mqtt = paho.Client() 09 mqtt.on_message = on_message 10 11 mqtt.connect("localhost", 1883, 60) 12 mqtt.subscribe("linux/+", 0) 13 14 mqtt.loop_forever() The client now connects
23%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
_64-dvd1.iso --2022-07-06 12:48:08--  https://download.rockylinux.org/pub/rocky/8/isos/x86_64/Rocky-8.6-x86_64-dvd1.iso Resolving download.rockylinux.org (download.rockylinux.org)... 146.75.82.132, 2a04:4e
22%
Open source customer relationship management software
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Martina Berg, Fotolia.com
is to activate your application installation with the Apache enable site command. Also, you need to tweak your php.ini file to allow uploads larger than 6MB, which you'll need for SuiteCRM file uploads
22%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
, 09 sizeof(j)); 10 [...] 11 MALLOC(pr, struct prison *, 12 sizeof(*pr), 13 M_PRISON, M_WAITOK | M_ZERO); 14 [...] 15 error = copyinstr(j.path, 16 &pr->pr_path, sizeof
22%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
IPv6 connections and authentication via Kerberos 5. Amanda copes with a large number of clients and can easily adapt to changing conditions. Before the backup, Amanda can launch a test program
22%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
a public key with hash 31452e1f896 f71542b6b9198188de1b5e59f5af62ffcefdc261df324636c90c7 but we're expecting a hash of XXX. If you are sure the remote system is authentic set

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice