Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (119)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 151 Next »

16%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
to their respective variables in Listing 3, the string.format() function concatenates to create a new string. The %s placeholder replaces string.format() with the content of the firstname and lastname variables
16%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
with their data. Back in the 1980s, operating systems started to use excess RAM as a page cache for caching disk access. The technology used since the start of the millennium, however, is Double Data Rate
16%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, there’s building construction, in which software has “architects” that help with the “blueprint” of the code and then turn it over to the software developers who “build” it. The second metaphor is complex
16%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
Docker Scan tool [3], which primarily deals with container images. Checkers As you might have guessed from its name, you'll look at Docker as the run time. Docker Scan classes itself, according to its
16%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
speeds than in a native Python implementation. The easiest approach is to generate NumPy arrays from existing Python lists: np.array([1, 2, 3]) The np stands for the module name of NumPy, which
16%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
of command-line tools for EC2. S3 [6] (Simple Storage Service) offers permanent storage independent of EC2 virtual machines being deployed and shut down. Specifically, we use S3 to store the code that gets
16%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
service mysql restart Once backed up, log in to the server and check the SSL status by typing \s or by checking the value of the have_ssl variable (Listing 3). Listing 3 Checking have
16%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
the executable, will open a meterpreter shell on the victim’s Windows box (see Figure 3). Figure 3: msfcli multi/handler options (above) and executing the listener
16%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
) documentation [8]. (Note that the most recent version of the tool is tracker3.) Table 1 Important Tracker Commands tracker daemon -s Start the daemon and its processes. tracker
16%
Introduction to HDF5
22.02.2017
Home »  HPC  »  Articles  » 
, 6 ) / ( 4, 6 ) }       DATA {          1, 2, 3, 4, 5, 6,          7, 8, 9, 10, 11, 12,          13, 14, 15, 16, 17, 18,          19, 20, 21, 22, 23, 24       }    } } } HDF5 has many ways to represent the same datatype

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice