Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1006)
  • Article (314)
  • News (203)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 153 Next »

10%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
10%
Best practices when working with Docker images
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Ilse Orsel on Unsplash
should be copied from the stage named stage_one. Because it copies only one file, the resulting image is an order of magnitude smaller – it is 124MB. Listing 3 Multistage Build FROM gcc
10%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Stephen Pedersen on Unsplash
2018, the project team released version 1.0; now, version 1.5-rc2 is available for download and promotes the software with the slogan "The speed of containers, the security of VMs." Compatible Run
10%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
frugally and quickly on all platforms. You can pick up the Comodo Rescue Disk system in the form of a hybrid ISO image [4] of only about 55MB, which then runs from a USB flash stick or CD-ROM. Software
10%
Listing 3
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
Listing 3: Installing ganglia-gmond into the Master Node [root@test1 RPMS]# yum install ganglia-gmond-3.4.0-1.el6.i686.rpm Loaded plugins: fastestmirror, refresh-packagekit, security Loading mirror
10%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
} 21 } 22 }, 23 { 24 "Effect": "Allow", 25 "Action": [ 26 "iam:PutRolePolicy", 27 "iam:DeleteRolePolicy" 28 ], 29 "Resource": "arn:aws:iam
10%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
!), and requires at least Windows Server 2012 R2 and PowerShell 2.0. Listing 1 shows the first lines of the migration loop. Listing 1 Migration by Script 01 foreach ($Mailbox in (Get-Mailbox)) { 02
10%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
to 4.2GHz) 4MB L2 cache 384 Radeon cores 800MHz GPU clock speed DDR3 1866MHz memory 100W Putting both the CPU and the GPU on the same processor allows the GPU to have access to system
10%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
pingtest.pl 01 #!/usr/bin/perl 02 use Cassandra::Client; 03 04 my $client=Cassandra::Client->new( 05 contact_points=>['172.21.0.2', '172.21.0.4', '172.21.0.5'], 06 username => 'admin', 07
10%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
. For example, [laytonjb@home4 ~]$ agedu -w Using Linux /proc/net magic authentication URL: http://127.0.0.1:42821/ A screenshot of the web browser output is shown in Figure 1

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 153 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice