Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 154 Next »

12%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
volumes: - type: volume destination: /var/lib/docker which brings up three container machines with hostnames kafka0 through kafka2, in which dockerd is later installed and configured (which
12%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
of detouring a request. Anyone responsible for the operation and maintenance of a company website is probably familiar with complaints and emergency calls from users saying that a website cannot be reached
12%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
and installed based on the system properties. On RPM-based distributions, for example, the new-kernel-pkg tool is used; it is called automatically as part of the kernel installation. By default, the ramdisk
12%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
with all of the following: DEP/NX. The idea is trivial: No segment within an ELF binary without the execution bit should be used to hold code that could eventually be called and therefore executed thanks
12%
Rex
19.02.2013
Home »  Articles  » 
, if you ask the programmer, Rex should actually be called (R)?ex. But, because this is difficult to read, write, and pronounce, I will simply use Rex in this article. Freedom of Choice Rex can manage
12%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
, the ability to create what are called type-bound procedures was introduced, which makes calling functions within a class much easier. Fortran 2003 also introduced type extensions and inheritance (key aspects
12%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
>" 13 } . . . 14 ] 15 } Before I describe the procedure further, note that if you want to integrate your cmdlet into the calling conventions of PowerShell, you will need to restrict
12%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
not have to type in the password every time the ubuntu user calls Ansible. As usual, you just need to store the public part of the respective SSH key in the .ssh/authorized_keys file in the ubuntu user
12%
Seeing Through a Web Darkly
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © phive2015, 123RF.com
and second-hand accounts just won't do. This was one of those times. Before this foray into the unknown reaches of the so-called dark web, I'd never cared nor even been curious about such nonsense. To be fair
12%
A Thousand Words Paint a Picture
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rouslan, 123RF.com
automation, or the problem itself. Think about it. When you receive a call to fix several dozen systems that no longer deliver their promised functionality, where do you begin? Of course, you'll ask

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice