Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (224)
  • Article (39)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 27 Next »

31%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
hv = [ "tiffy.tuxgeek.de", "ernie.tuxgeek.de" ] 07 08 for hv_host in hv: 09 10 uri = "qemu+ssh://virtuser@" + hv_host + "/system" 11 conn = libvirt.openReadOnly(uri) 12 13 hypervisor_name = conn
31%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
and "closed" in line and "preauth" in line: 06 srcIP=line.split()[8] 07 print(srcIP) 08 raiseAlert(relay) 09 sendAlert(args.server, srcIP) 10 11 line=iptablesFile.readline() 12
31%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
= kvmVM #specify the name 02 CPU = 1 # How many CPUs required? 03 MEMORY = 512 # RAM in MB 04 OS = [ 05 KERNAL = "/boot/vmlinuz-2.6.32-24-generic", # Kernel to use 06
31%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
prompts you for your access and secret key (Figure 6). As an Amazon user, you are given both on registering with the service [12]. Next, click on your own name in the top right corner, select Security
31%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched: docker.io registry
31%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
_64-dvd1.iso --2022-07-06 12:48:08--  https://download.rockylinux.org/pub/rocky/8/isos/x86_64/Rocky-8.6-x86_64-dvd1.iso Resolving download.rockylinux.org (download.rockylinux.org)... 146.75.82.132, 2a04:4e
31%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
is then establishment of a totally normal connection. If you want to try this out yourself, you can check out previous articles in Linux Magazine [4]-[6]. Alternatively, you can start with the Knockd [7] project
31%
Get Started with Parallel CPython
07.11.2011
Home »  HPC  »  Articles  » 
 if '__main__' == __name__: 09  10     p1 = Process(target = test, args = ('Rich',)) 11     p2 = Process(target = test, args = ('Nus',)) 12     p3 = Process(target = test, args = ('Geeks',)) 13  14     p2
31%
Nagios Passive Checks
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Lisa Young, 123RF.com
08 passive_checks_enabled 1 09 notifications_enabled 1 10 check_freshness 1 11 freshness_threshold 93600 12 check_period 24x7 13
31%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
IPv6 connections and authentication via Kerberos 5. Amanda copes with a large number of clients and can easily adapt to changing conditions. Before the backup, Amanda can launch a test program

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice