Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3&00 Llorente 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (99)
  • Article (45)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next »

15%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
into continuous integration and continuous deployment (CI/CD) pipeline tests and IoT appliances. The super-portable k3s [2] Kubernetes distribution is a lightweight solution to all the capacity challenges ... The k3s lightweight and secure Kubernetes distribution can handle both unattended workloads in remote locations with minimal resources and clusters of IoT appliances. ... Kubernetes k3s lightweight distro
15%
Warewulf Cluster Manager – Master and Compute Nodes
22.05.2012
Home »  HPC  »  Articles  » 
/group_gz | 212 kB 00:00 Package flex-2.5.35-8.el6.x86_64 already installed and latest version Package gcc-4.4.6-3.el6.x86_64 already installed and latest version Package autoconf-2.63-5.1.el6.noarch
15%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
tells Yara what to do. In this case, the file tells Yara to report that it has found something. To test if Yara is working, I create three files named badfile1.txt, badfile2.txt, and badfile3.txt. I put
15%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
00:00:00 Thursday January 1, 1970, Coordinated Universal Time (UTC). Listing 1: Perl Example Client #!/usr/bin/perl   use strict; use warnings; use IO::Socket; use Sys::CpuLoad;   my
15%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
of filesystems from which to choose, and the ext2/3/4 series is likely known by everyone. If you work with a current distribution, you have probably met other filesystems, too (Table 1). Table 1
15%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
15%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
magazine [3]. In other words, the many Cobbler system records are really the biggest problem. Just to jog your memory: Using system records, Cobbler can create an individual PXE configuration file for each
15%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
YZCD 03 # DaemonOpts: -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize 04 ################################################################################ 05 # Collectl: V3.6.1-4 HiRes: 1 Options
15%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
with ; or \g. 03 Your MySQL connection id is 3 to server version 5.0.22 01 Type 'help;' or '\h' for help. Type '\c' to clear the buffer. 01 mysql> Your connection to the MySQL server on the remote Unix
15%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice