Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (592)
  • Article (170)
  • News (84)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 85 Next »

21%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
publisher TEXT, 07 authors MAP, 08 circulation INT, 09 issue TEXT, 10 PRIMARY KEY(publisher, issue, isbn) 11 ); 12 13 # INSERT INTO titles(isbn, year, title, publisher, authors, circulation
21%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
, the loss function, and the metrics. The optimizer to be used is adam [12], a stochastic gradient descent optimizer that makes estimation of the first and second order moments (gradients). For the model
21%
New features in the Bareos Bacula fork
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Maxim Kazmin, 123RF.com
community to continue development of an independent fork named Bareos. The first stable release was Bareos 12.4 in April 2013 (the version number stands for the year and the quarter of the feature freeze
21%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
your very first Ansible controller, the IBM Redbook, Using Ansible for Automation in IBM Power Environments [12], is a great reference; particularly section 3.3, "Installing your Ansible control node
21%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
it is filtered or sanitized correctly by the application. Mutillidae does indeed process the id command if you separate the hostname and the command with a semicolon (Figure 12
21%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
with more advanced management techniques. Set the disabled option in /etc/xinetd.d/tftp  to no  (as shown in Listing 12). Listing 12: /etc/xinetd.d/tftp service tftp service tftp { socket
21%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
COPY --from=dockerize /usr/local/bin/dockerize /usr/local/bin/ COPY gcpemu_csptst.sh /usr/local/bin/run.sh ENTRYPOINT ["run.sh"] Finally, create the YAML file in Listing 12 and launch the local
21%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
no longer than five hours. Registering for the test can take some time; applications for the test must be vetted manually. The Linux Magazine editorial team was granted access about 12 hours after applying
21%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
| elapsed: 0.0s remaining: 4.5s [Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s [Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s
21%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice