Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (488)
  • Article (154)
  • News (15)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 66 Next »

17%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
| = . +..+ | 19 | o+ B.o.. | 20 | o..o +.o | 21 +-----------------+ 22 root@hercules:~/.ssh# ssh-copy-id root@sugar 23 root@sugar's password: Check ~/.ssh/authorized_keys to make sure you haven
17%
Tech News
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
 
significantly more resources, which means that the scope of this attack is quite remarkable. According to Cloudflare, the botnet used for the attack consisted of 6,000 unique bots from 1,300 different networks
17%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
and the other on all IPv6 IP addresses. Listing 1 Checking Open Ports chris@DebianBox:~# lsof -i :22 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sshd 3328 root 3r IPv4 33323 0t0 TCP *:ssh
17%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f3c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e6c4e1f
17%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
of this series with Footloose for automation. To begin, grab the Footloose binary from the GitHub project site [6], if you haven't set it up already, and create the YAML file shown in Listing 1 in the directory
17%
Cloud Foundry realizes a service mesh
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © lightwise, 123RF.com
cddaa6-0886-44b3-9590-16717d5cd3c2", 20 "service_instance_guid": null, 21 "port": null, 22 "domain_url": "/v2/shared_domains/fb6bd89f-2ed9-49d4-9ad1-97951a573135", 23
17%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
to logfiles, and it’s pretty simple to use: [laytonjb@test1 ~]$ logger "This is a test" ... [root@test1 ~]# tail -n 2 /var/log/messages Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet. Aug 22 17
17%
Shared Storage with NFS and SSHFS
12.09.2018
Home »  HPC  »  Articles  » 
. Moreover, you don't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port 22
17%
Virtual switching with Open vSwitch
28.07.2011
Home »  CloudAge  »  Articles  » 
 
time. To do so, load the kernel module manually: modprobe datapath/linux 2.6/U openvswitch_mod.ko If this command fails, you probably need to unload a bridge module: rmmod bridge. The kernel module
17%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
the letter P was missing in PREFIX .) If you use multiple versions of MPI, you need to build Remora for each version. If you are using environment modules (e.g., Lmod [6]), you can easily write

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice