Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (605)
  • Article (136)
  • News (10)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 76 Next »

17%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
is a key part of securing an estate. Common Vulnerabilities and Exploits (CVEs) [3] are the most popular way of listing, publishing, and categorizing security bugs. Within Prisma Cloud Compute, you can
17%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
but comprehensively documented [3]. It logs HTTP requests and gives administrators unrestricted access to the individual elements of a request, such as the content of a POST request. It also identifies attacks in real
17%
Managing Linux systems with Spacewalk
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© patrimonio designs, Fotolia.com
can be installed on Red Hat Enterprise (RHEL) [3], Fedora [4], or CentOS [3] Linux. Note that Spacewalk does need a current Java Runtime Version 1.6.0 or newer. You can use the Open JDK for this; Fedora
17%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
of the solution matrix, u (lines 119-123), (2) the iteration loop (lines 137-142), and (3) the update of the solution (lines 146-151). Loops are wonderful places for parallelization – they can use a great deal
17%
Prowling AWS
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Dmitry Naumov, 123RF.com
. For some additional context, sections on the AWS Security Blog [3] are worth digging into further. To bring more to the party, the sophisticated Prowler also stealthily prowls for issues in compliance
17%
MPI Apps with Singularity and Docker
18.03.2020
Home »  HPC  »  Articles  » 
these tests are not performance tests that require detailed specifications about the hardware and software, I offer a brief description. The system ran Linux Mint 19.3 and used the latest PGI Community Edition
17%
Improving performance with environment variables
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © sgame, fotolia.com
in increased performance. Octave Probably one of the best examples I know for the use of the LD_PRELOAD trick is to push basic linear algebra subprogram (BLAS) [3] computations from a CPU onto an NVidia GPU. I
17%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
_python_interpreter variables ideally remain unchanged: They cause Python to connect to the host on standard SSH port 22 and to use Python 3 when calling commands on the target system. Next, check whether the devops.hosts setup
17%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
that the attacker owns. Rhino Security Labs [3], the creators of the open source web penetration framework Pacu [4], takes a more expansive view of what permissions are dangerous enough to be shadow
17%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
configuration, you might want to test the device itself. To do so, scan a fingerprint by giving the tf-tool --acquire command (Figure 3). Then you can use tf-tool --verify

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 76 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice