Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: notes ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (466)
  • Article (174)
  • News (50)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 70 Next »

14%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
on the Kubernetes Master node, first. When you run it on a slave (aka worker and, previously, minion) node, you will be able to check against any plaintext authentication security holes when the slaves communicate
14%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
and frameworks are supported: In general: C++, JavaScript, Python, PHP, .NET, Rust, Swift, Kotlin, Ruby, Java, Go, and Node.js Hardware-related programming languages: Embedded C and Arduino Web: React
14%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
FD TYPE DEVICE SIZE/OFF NODE NAME docker-pr 13330 root 4u IPv4 91904 0t0 TCP *:2222 (LISTEN) A simple test is to use the unerring, ultra-reliable netcat to see what is coming back
14%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
.a.k.c.FetchSessionHandler:438 - [Consumer clientId=consumer-1, groupId=jesseyates.kafka.mirror] Error sending fetch request (sessionId=INVALID, epoch=INITIAL) to node 3: org
14%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
: Bootstrapping from host '192.168.38.131' via built-in policy '/var/cfengine/inputs/failsafe.cf' R: This autonomous node assumes the role of voluntary client R: Updated local policy from policy server R: Triggered
14%
Multiprocessing in Python with Fortran and OpenMP
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Photo by Zachary Young on Unsplash
all of the cores on a node or a subset of nodes (user controllable). To achieve this, I use F2PY to build the module. F2PY The tool named F2PY [8], Fortran-to-Python, creates a connection between
14%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
nodes. For example, take a peek at Environment  | Availability . Setting Up a Vulnerability Scan Once you have defined your networks and added in your assets, you can move on to vulnerability scanning
14%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
Kubernetes service like the Elastic Kubernetes Service (EKS) on AWS, for example, a Container Defender will additionally scan the host operating system (OS) on the nodes that are running the Console. Host
14%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
supports IP-based threat lists. Two of my favorites are Tor exit nodes [3] and Open Threat Exchange (OTX) community feeds from AlienVault [4], but you may find some others by just doing some research
14%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
a database or file and you are running a large number of copies of the same application, FS-Cache might help, because each node could cache the database or file. Filesystem-Independent Mount Options

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice