Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (696)
  • Article (207)
  • News (39)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 95 Next »

16%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
architecture => 'i686' 10 kernel => 'Linux' 11 kernelrelease => '3.11.0-15-generic' 12 } 13 $hostname = 'sugar' 14 $operating_system = 'Ubuntu' 15 $operatingsystem = 'Ubuntu' 16 $operating
16%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
2 apache2-mpm-prefork apache2-utils apache2.2-bin \ apache2.2-common apache2-doc apache2-suexec libapache2-mod-php5 libapr1 \ libaprutil1 libaprutil1-dbd-sqlite3 libaprutil1-ldap libapr1
16%
Monitoring Cloud Service Charges
17.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
_costs = { 't1.micro' => 0.02, 'm1.small' => 0.095, 'c1.medium' => 0.19, 'm2.2xlarge' => 1.14, 'm2.4xlarge' => 2.28 } Then I list the regions. This could have been dynamic, but I don’t want
16%
HDF5 with Python and Fortran
21.03.2017
Home »  HPC  »  Articles  » 
  18      print "dset.shape = ",dset.shape 19  20      print "dset.dtype = ",dset.dtype 21  22      print "dset.name = ",dset.name 23    24      print "f.name = ",f.name 25    26      grp
16%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
-A INPUT -p tcp -s [IP address of allowed server] --dport 22 -j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
16%
Chronicles
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Maxim Kazmin, 123RF.com
can't be bothered to do what's right, although it's your responsibility to be sure they do. That sounds a lot like a classic catch-22 situation. Although, I never read the book or saw the movie, I
16%
Modularize websites with Web Components
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Prokhorov, fotolia.com
.stringify(arr)); 22 } 23 } 24 25 delItem(text) { 26 const arr = this.listItem().filter(stext => text !== stext); 27 localStorage.setItem('annotations', JSON.stringify(arr.length>0?arr:[])); 28
16%
Gatling load-testing tool
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by NoWah Bartscher on Unsplash
"Accept" -> "text/html", 16 "User-Agent" -> "LinuxMagazine/1.0.1", 17 "Accept-Encoding" -> "gzip, deflate", 18 "Connection" -> "keep-alive", 19 "DNT" -> "1" ) 20 21 // http connector 22
16%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
% of 454.22GB Processes: 168\r 60 Memory usage: 22% Users logged in: 1\r 61 Swap usage: 0% IP address for eth0: 192.168.1.250\r 62 \r 63 Graph this data
16%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes. In simple terms, fail2ban [3] keeps a close eye on your

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice