Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (53)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 34 Next »

18%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
variable "site_author" { 07 type = "string" 08 default = "Jon Doe" 09 } 10 variable "site_container" {} 11 variable "do_token" { 12 type = "string" 13 } 14 variable "key_path" {} 15 variable "ssh
18%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
ParamTypeClasses #-} 04 {-# LANGUAGE OverloadedStrings #-} 05 {-# LANGUAGE TypeFamilies #-} 06 {-# LANGUAGE TemplateHaskell, QuasiQuotes #-} 07 -- import libraries 08 import Yesod 09 import Data.Text 10 import
18%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
password 8 ZDF339a.20a3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09 multicast 10 ipv6 nd suppress-ra 11 ! 12 interface eth1 13 ip address 10
18%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-algorithm sha1; 07 encryption-algorithm 3des-cbc; 08 } 09 policy test123 { 10 mode main; 11 proposals Phase1-3des-sha; 12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa
18%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
and "closed" in line and "preauth" in line: 06 srcIP=line.split()[8] 07 print(srcIP) 08 raiseAlert(relay) 09 sendAlert(args.server, srcIP) 10 11 line=iptablesFile.readline() 12
18%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
around the GIL is to run computationally intensive code outside of Python with tools such as Cython [1] and ctypes [2]. You can even use F2PY [3] with compiled C functions. All of the previously mentioned
18%
HDF5 with Python and Fortran
21.03.2017
Home »  HPC  »  Articles  » 
 = f.create_group("subgroup"); 27     28      dset2 = grp.create_dataset("another_dataset", (50,), dtype='f'); 29      print "dset2.name = ",dset2.name 30     31      dset3 = f.create_dataset('subgroup2/dataset_three', (10,), dtype
18%
Tips and Tricks for Containers
12.05.2020
Home »  HPC  »  Articles  » 
           TAG                     IMAGE ID            CREATED             SIZE nvidia/cuda          10.1-base-ubuntu18.04   3b55548ae91f        4 months ago        106MB hello-world          latest                  fce289e99eb9        16 months ago       1.84kB Running the nvidia
18%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
_string3= {9E 68 2B C2 99 6A 59 F7 F9 8D 30} 07 Conditions: 08 $test_string1 or $test_string2 or $test_string3 09 } In Listing 2, I tell Yara to look for the strings that my
18%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
shows some function call examples. Listing 1 Example Function Calls # Rounding up # 11 round(10.9) # Generate an array of numbers # [9, 8, 7, 6, 5, 4, 3, 2, 1] numbers.range(9, 1

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice