Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌留痕优化【电报e1000】google收录优化.pin.0x20 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (88)
  • Article (37)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

80%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
/CIS_Docker_1.11.0_Benchmark_v1.0.0.pdf AppArmor: http://wiki.apparmor.net/index.php/Main_Page Grsecurity: https://grsecurity.net PaX: https://pax.grsecurity.net Docker capabilities allowed
80%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
" = "" ] 17 then 18 echo "$0 error: ID missing." >&2 19 fi 20 21 id=$1 22 shift 23 24 echo "$id $(date +%s) $mode" >> $ACCOUNTING The VM_HOOK construct can appear more than once in the configuration
80%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
, and easy to follow. Listing 1 Installing k3s [INFO] Finding latest release [INFO] Using v1.0.0 as release [INFO] Downloading hash https://github.com/rancher/k3s/releases/download/v1.0.0/sha
80%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
backup.1 [laytonjb@home4 TEST]$ rsync -a --delete /home/laytonjb/TEST/SOURCE/ backup.0 [laytonjb@home4 TEST]$ ls -s total 16 4 backup.0/ 4 backup.1/ 4 backup.2/ 4 SOURCE/ [laytonjb@home4 TEST]$ du -sh 24M
80%
Getting started with Prometheus
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Clay LeConey on Unsplash
a period of time. A classic example would be noting the temperature and the time each time you read your home thermometer. At the end of the day, you could put that data on a graph with time on the x -axis
80%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
are less than $35 and most of the time cost less than $100; some SBCs that cost only $10 even include a quad-core processor, an Ethernet port, and WiFi. Moreover, the general purpose I/O (GPIO) pins
80%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
) Intel Atom D2701, 2.13GHz (dual core) RAM 4GB 0.5GB 2GB 2GB Network Interface 2x 1Gbit Ethernet 1x 1Gbit Ethernet 2x 1Gbit Ethernet 2x ... 24
80%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
factors, constitute the basis of any authentication method. Table 1 Authentication Methods Factor Examples Advantages Disadvantages Knowledge Password, PIN
80%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
.168.122.236 6200 Trying 192.168.122.236... Connected to 192.168.122.236. Escape character is '^]'. id; uid=0(root) gid=0(root) cat /etc/passwd; root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon
80%
News for Admins
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
 
the nodes. Other features include multiple I/O, nodes power management via an I2C bus, up to 28 cores, 7 x 40 pin GPIO, HDMI, audio jack, and ATX connections, 8 USB ports, real-time clock, flash mode

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice