Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1014)
  • Article (317)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 155 Next »

9%
Sharing a Linux Terminal Over the Web
08.08.2022
Home »  HPC  »  Articles  » 
 because, typically, head nodes or workstations open ports 22 (SSH), 443 (HTTPS), and sometimes 80 or 8080 (HTTP). Can I find terminal-sharing tools that use these ports? Moreover, can a web browser be used for terminal
9%
Getting data from AWS S3 via Python scripts
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © erikdegraaf, 123RF.com
if page.get('Contents') is not None: 21 for file in page.get('Contents'): 22 s3pump(file.get('Key'), bucket) Data Highway? For large S3 buckets with data in the multiterabyte
9%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
, with 45 percent saying it will increase slightly and 32 percent stating it will increase significantly. Only 22 percent of respondents claimed open source adoption will remain the same and one percent
9%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
was received [2]. Modular Extensions for Apache Apache version 2.2 and newer has a mod_reqtimeout extension that lets you configure the RequestReadTimeout option, which you can use to set different request
9%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
 data copy(a) !$acc parallel loop   do i=1,n     a(i) = 0.0   enddo !$acc data end   #pragma acc data copy(a) {   #pragma acc parallel loop   {     for (int i=0; i < n; i++)     {       a[i] = 0.0
9%
Run Kubernetes in a container with Kind
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
-Lo ./kind https://kind.sigs.k8s.io/dl/v0.10.0/kind-linux-amd64 $ chmod +x ./kind $ mv ./kind /usr/local/bin/kind $ kind --version kind version 0.10.0 Get an incredibly quick start
9%
Law of Averages – Load Averaging
01.02.2013
Home »  Articles  » 
 
at the output of uptime [1] on OS X:   13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63   The uptime command displays the load average in its common form, averaging the last one, five, and 15
9%
Importing SSH keys on AWS
05.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
see the newly uploaded keypair: ec2-describe-keypairs KEYPAIR dan-key fc:39:b2:60:90:4c:0f:66:fc:b8:a6:54:af:19:0c:ef KEYPAIR my-key a6:54:af:19:0c:ef:fc:39:0f:66:fc:b8:b2:60:90:4c KEYPAIR your
9%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
. CMMC in Depth CMMC is currently on its second iteration, CMMC 2.0. The prior iteration of CMMC was CMMC 1.0, which built a framework of four elements: security domains, capabilities, practices
9%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i kubeletctl pods --cidr 3.71.72.0/24 -i Figure 1: Scanning for nodes to see if they are vulnerable with an exposed kubelet

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice