Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (747)
  • Article (215)
  • News (38)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 101 Next »

15%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
into Red Hat's cloud stack (Figure 1). After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation for the new products
15%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
from the GitHub README: Mutillidae II boasts 40+ vulnerabilities and challenges. Each of the highly regarded OWASP Top 10 security threats are covered (all the threats are included from the 2007
15%
Integrating Podman and systemd
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Nick Fewings on Unsplash
Start=/usr/bin/podman start apache ExecStop=/usr/bin/podman stop -t 10 apache ExecStopPost=/usr/bin/podman stop -t 10 apache PIDFile=/var/run/containers/storage/overlay-containers/0b43a756b2eb9947239827e571675cef10095515be02a
15%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
/share/vagrant/gems/doc/vagrant-libvirt-0.0.24/polkit/10-vagrant-libvirt.rules /etc/polkit-1/rules.d # usermod -a -G vagrant The decompressed CDK and the Vagrant Box are found under ~/devel/cdk/ in this example. The first
15%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
, it will only capture the first 68 bytes of each packet. Except in older versions of tcpdump, a snaplen value of 0 uses a length necessary to capture whole packets. Figure 1 dissects the output of a sample dump
15%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
, interfaces, switches, and so on in virtual form as containers or pods in Kubernetes. However, the project managers take a rather skeptical view of this, referring to it as Cloud 1.0, because many benefits
15%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
2 min, 0 users, load average: 0.10, 0.10, 0.04 $ more /tmp/hosts 192.168.1.4 192.168.1.250 This command tells pdsh to take the hostnames from the file listed after -w ^ (no space between
15%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
startserver() 05 io = IOBuffer(); 06 x = 0.0:0.001:1.0 07 WebSockets.listen("127.0.0.1", PORT) do ws 08 for msg in ws 09 lc1 = JSON.parse(msg)["c1"] 10 lc2 = JSON.parse(msg)["c2"] 11
15%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
.g., Wireshark). Despite this failing, VLANs are considered safer than normal networks. In truth, a network is also based on a VLAN where all nodes on the network work with a VLAN ID of 0. Multivendor VLANs
15%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
Load 30 check_command check_nrpe!check_load!5.0!4.0!3.0!10.0!6.0!4.0 31 } 32 define service{ 33 use generic-service ; Name of service

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice