Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (114)
  • Article (41)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »

14%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
= sol.copy() 10 11 for j in range(0,ny-1): 12 sol[0,j] = 10.0 13 sol[nx-1,j] = 1.0 14 # end for 15 16 for i in range(0,nx-1): 17 sol[i,0] = 0.0 18 sol[i,ny-1] = 0.0 19 # end for 20 21 # Iterate 22
14%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
.sin(periods * 2 * np.pi * t) 12 return max(value, 0.0) 13 else: 14 value = np.sin(periods * 2 * np.pi * t) 15 return max(value, 0.0) 16 17 # building the data vector 18 my_data = [] 19 i = 0 20 while
14%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77 22} 13 $s_anchor_tag = "
14%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables: prefix. Listing 1 iptable Rules 01 *filter 02 *filter 03 :INPUT ACCEPT [0:0] 04
14%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
{ 10 "UserName": "ferdinand", 11 "SerialNumber": "arn:aws:iam::123456789:mfa/ferdinand", 12 "EnableDate": "2021-04-25 09:00:38+00:00" 13 } 14 ], 15 "Groups
14%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
sensors available on an older MacBook Pro. Not all values discovered are temperatures. On Linux, my default choice for in-terminal monitoring TUI is glances  [6], which I have examined previously
14%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 -e package-list.txt Enter passphrase: Re-enter passphrase: Output filename is: package-list.txt.lrz package-list.txt - Compression Ratio: 2.537. Average Compression Speed:  0.000MB/s. Total time: 00:00:05.11 Listing 11
14%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
uses for such cases. Moments later, I received email telling me that malware was discovered by Palo Alto WildFire analysis [6]. WildFire identifies unknown malware, zero-day exploits, and advanced
14%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
confirm that the kernel and kernel-debuginfo packages have the same version number: rpm -q kernel-PAE kernel-PAE-debuginfo oprofilekernel-PAE-2.6.32.10-90.fc12.i686 kernel-PAE-debuginfo-2.6.32.10-90.fc12.i
14%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
-2.el8                          appstream        29 k  numactl-libs               x86_64 2.0.12-13.el8                         baseos           35 k  ohpc-filesystem            noarch 2.6-2.3.ohpc.2.6

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice