Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (546)
  • Article (123)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 68 Next »

17%
Introduction to HDF5
22.02.2017
Home »  HPC  »  Articles  » 
 ) }       DATA {          1, 2, 3, 4, 5, 6,          7, 8, 9, 10, 11, 12,          13, 14, 15, 16, 17, 18,          19, 20, 21, 22, 23, 24       }    } } } HDF5 has many ways to represent the same datatype
17%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
a family of wasps [2]. Although I'm a fan of Mutillidae, other applications like WebGoat [3], also from OWASP, offer a highly sophisticated and multilayered insecure web application, as well. The most
17%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
': 07 ensure => running, 08 enable => true, 09 hasrestart => true, 10 require => Package['openssh-server'], 11 } 12 13 augeas { 'Set SSH Protocol to 2': 14 context
17%
Managing Vim plugins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Thomas Reichhart, 123RF.com
of responders [2]. Much of this popularity is due to the degree of customization created by its plugins – almost 1,600, according to the VimAwesome site [3], and even that number may be low. Most users
17%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
that the attacker owns. Rhino Security Labs [3], the creators of the open source web penetration framework Pacu [4], takes a more expansive view of what permissions are dangerous enough to be shadow
17%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
# and network has converged traceroute -In 10.4.1.25 1 10.3.1.22 # backup VPN # router site 3 2 172.16.1.7 # backup VPN # router site 4 3 10.4.1.25 LAN Failure
17%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
of approximately $3M per MW of IT. In addition, IT systems that can tolerate higher temperatures can reduce the risk of IT failures during facility cooling outages." Red Hat and SAP Red Hat announced
17%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database. Figure 1: An image scan with Trivy generates a long list of vulnerabilities
17%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
-passphrase Several parameters in this file define the repository layout [2] [3], as follows: Origin: An optional field that describes the origin of the repository. You can select a free line of text. Label
17%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
  1 loop /snap/core20/1974 loop2         7:2    0  63.5M  1 loop /snap/core20/2015 loop3         7:3    0  73.9M  1 loop /snap/core22/864 loop4         7:4    0 237.2M  1 loop /snap/firefox/3026 loop5

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice