Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1126)
  • News (395)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 183 Next »

19%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
the secretcode Python module. The shared object has the function hellofortran, which you use in the second command, secretcode.hellofortran(). I used the argument 5 in the test. OpenMP and f2py If you can
19%
Container IDE with cloud connection
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Christin Hume on Unsplash
important things. This is where Gitpod [1] comes in. One Pod, One Word The technology behind Gitpod picks up on relatively new developments from the open source scene. Besides Docker, it uses the Eclipse
19%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
with Nessus' own Nessus Attack Scripting Language (NASL). The result of the check is a list of identified vulnerabilities and open ports, which Nessus discovers with the help of Nmap. Although this arrangement
19%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
. To begin, insert the USB drive into a USB slot on your computer and open a Windows command prompt in Admin mode. To set up the USB drive, follow the DiskPart commands in Listing 1. The preparative work
19%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
Companies that provide web services for the outside world in their own infrastructure are exposed to a variety of threats. The developers of the open source mitmproxy tool describe it as the Swiss
19%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
, you need to install virsh by installing the libvirt-bin package: The counterpart on openSUSE goes by the name of libvirt-client . To make sure the program in place on your disk is working, just type
19%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
it’s fast, the encryption is very good if used correctly, the code is open-source, and it follows the OpenPGP specification that is an IETF standard. GPG was really designed as a command
19%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
. It can result in leakage of secret data in applications such as OpenSSL that has secret dependent control flow at any granularity level. In order to exploit this flaw, the attacker needs to run a malicious
19%
News for Admins
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
 
enterprise applications as a point of entry. So far, Unit 42 has found 33 exploits, targeting 32 vulnerabilities in open source software, such as Drupal, Elasticsearch, Apache Hadoop, Redis, and the Think
19%
News for Admins
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
 
, fill out the form on the support page (https://almalinux.org/support/), and CloudLinux will reach out to you. The Linux Foundation Exploring the Impact of Open Source Ecosystems Linux Foundation

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice