Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 171 Next »

23%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
Dockerfile (Listing 4). In this way, I will build two images: one containing the Flask app and another with Nginx. The user will connect to a Nginx instance, which will communicate with the Flask app. The app
23%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
Podman since version 4.4 has a native mechanism to start containers automatically by systemd unit files: Podman Quadlet. In this article, I guide you through preparing your system and configuring
23%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
creates a 4KB string of each of the letters a , b , and c ; then, it puts the last character of the string into the first position over and over until the string reaches its initial state. The script
23%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
shown in Figure 4. Figure 4: Header bytes 12-15. Looking at byte 13, if SYN and ACK are set, then your binary value would be 00010010 , which
23%
Office 365 vs. Google Apps
19.01.2012
Home »  Articles  » 
 
is based on SharePoint Online, lets users store documents at a central location and edit new documents or tables in the web-based version of the office applications (Figure 4
23%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
Now show the available plugins with the nessus_policy_list command (see Figure 4). Figure 4: Viewing the available policies in the Nessus policy list
23%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
is scrolling back in time (Figure 4). Figure 4: Going back in time with Zenith. You can tell the chart has gone back in time because at the very top it says
23%
Zentyal Server 3.5
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © PozitivStudija, fotolia.com
as SOHO users, and the software supports explicitly heterogeneous environments. Thanks to Samba 4, the distribution can act as a domain controller within a Windows-based network. The system also comes
23%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
kernel of the ONIE installer. ONIE searches for the operating system and installs it. The ONIE installer [4] looks for the operating system in several locations. If ONIE finds a USB storage device
23%
Next-generation terminal UI tools
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Lucy Baldwin, 123RF.com
of terminal user interface (TUI) libraries, including Ncurses [3] and Newt [4]. Jeff Layton has previously graced these pages with a tutorial on how TUI tools are developed today [5], and yours truly followed

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice