Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb"22 08 Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (90)
  • Article (14)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

14%
Safeguard and scale containers
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © cepixx, 123RF.com
Version: v1 02 kind: Pod 03 metadata: 04 name: nginx 05 spec: 06 containers: 07 - name: nginx 08 image: nginx 09 ports: 10 - containerPort: 80 A replication controller [12], however
14%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
used the example configuration file from the installation help page [6] (Listing 1). As you can see in line 12, the following container image registries are to be searched: docker.io registry
14%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
.42.0.255 dhcp_subnets: - ip: 10.42.0.0 netmask: 255.255.255.0 domain_name_servers: - 10.42.0.10 - 10.42.0.11 range_begin: 10.42.0.200 range_end: 10.42.0.254 ntp
14%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
14%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
seq_timeout = 10 08 tcpflags = syn 09 command = /usr/sbin/iptables -A INPUT -s \ %IP% -p tcp --dport 22 -j ACCEPT 10 11 [closeSSH] 12 sequence = 9000
14%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
"conditions": [ 05 { 06 "type": "RuntimeReady", 07 "status": true, 08 "reason": "", 09 "message": "" 10 }, 11 { 12 "type": "NetworkReady", 13
14%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
08 default: 09 $(MAKE) -C $(KDIR) M=$(PWD) modules 10 endif 11 12 clean: 13 rm -rf *.ko *.o *.mod.c *.mod.o modules.order 14 rm -rf Module.symvers .*.cmd .tmp
14%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
(Listing 1), which indicates a push. Listing 1 Server Push in Log 2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0" 2020-11-22T12:01:10+01:00 1606042870.567 200
14%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
. Depending on the functional scope, the prices are between US$ 1,000 and US$ 5,000 including 12 months of free upgrades, news, and information. For newcomers to the world of server virtualization, Citrix
14%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
.Xensource.xenapi.Connection; 07 import com.Xensource.xenapi.Host; 08 import com.Xensource.xenapi.Session; 09 import com.Xensource.xenapi.Task; 10 11 import de.pm.xenserver.utils.Server; 12 13 public class TestAPI { 14 15

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice