Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (291)
  • Article (61)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 36 Next »

17%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
= 50ms; 07 .interval = 3s; 08 .window = 10; 09 .threshold = 8; 10 } 11 } 12 13 set beresp.grace = 12h; Changes on the Fly The reverse proxy not only delivers web pages
17%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
------------------------------------------- /opt/apps/intel11_1/modulefiles ------------------------------------------- fftw3/3.2.2 gotoblas2/1.08 hdf5/1.8.4 mkl/10.2.4.032 mvapich2/1.4 netcdf/4.0.1 openmpi/1
17%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
Press [1], Drupal [2], or Joomla [3], generally they only have to unpack the core on the server and then add other modules. Installing security updates conscientiously and in good time counteracts ubiquitous
17%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
17%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
17%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
: "Red" 08     Model year:  1988 Listing 2: JavaScript Code for Listing 1 01 // JavaScript 02 var autos; 03  04 autos = { 05   bmw: { 06     color: "Blue", 07     Model year: 1990 08   }, 09   vw: { 10
17%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
-RSA-AES256-GCM-SHA384 05 DHE-RSA-AES128-GCM-SHA256 06 DHE-RSA-AES256-GCM-SHA384 07 ECDHE-ECDSA-AES128-SHA 08 ECDHE-ECDSA-AES256-SHA 09 ECDHE-ECDSA-DES-CBC3-SHA 10 ECDHE-RSA-AES128-SHA 11 ECDHE-RSA-AES256-SHA
17%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
rreport import reporter 04 import rpy2.robjects as ro 05 06 devs = importr('grDevices') 07 08 main = "3. Kepler's Law" 09 path = "tmp/Kepler3.png" 10 11 rep = reporter("galaxy", "comets", ["semaj
17%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
a Flask app and set the OpenID connect config params 06 app = Flask(__name__) 07 app.secret_key = 'hu5t82LXfYKtr3XFcPeAYaCBWFK8DcI1' 08 app.config['OIDC_CLIENT_SECRETS'] = 'oidc-config.json' 09 app
17%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-algorithm sha1; 07 encryption-algorithm 3des-cbc; 08 } 09 policy test123 { 10 mode main; 11 proposals Phase1-3des-sha; 12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 36 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice