Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12!600 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (463)
  • Article (121)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 60 Next »

17%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
.2.17 Python/3.9.6 Darwin/20.5.0 source/x86_64 prompt/off The version numbers here are just by way of an example, of course. The CLI is now installed. You can try to run a command, for example: aws ec2
17%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
for different scenarios on the website [9]. The Bitnami project pages supply users with installers for Linux, Windows, and OS X, as well as a virtual machine for VMware [10]. To set up the DAM system yourself
17%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
msstore Search repo(s) for matching packages by nameLimit search to a particular package source list ls winget listwinget list - n 12winget list --upgrade-availablewinget list
17%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
time relative to Docker. Docker Dominance The first version of Docker [1] was released March 20, 2013. Although containers had already been available on Unix-like systems for a few years, Docker
17%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
17%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77 22} 13 $s_anchor_tag = "
17%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
; will run on 2GB but will be very slow with Proxy Servers attached 30GB of disk space per (Software) channel; separate partition /var/satellite/ 12GB of disk space for embedded database; separate
17%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
machine. Initial evaluations on the practical conditions are easily possible on a well-equipped PC with a quad-core CPU, 1GB of RAM, a network interface card, and 20GB of free hard disk storage
17%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
of a large number of photos that have different output formats (e.g., for a picture gallery), as shown in the following code example: Cd photos mkdir standardphotos For i in .jpg ; do convert $i -resize 600x ... MobaXterm, a portable X server for Windows, bundles built-in Unix/Posix tools into a single portable EXE file, letting you use a Linux command line and tools on the Windows desktop.
17%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
} 19 20 -re "($|%|>) " { interact } 21 22 timeout { 23 send_tty "No response from $host\n" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice