Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (941)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 134 Next »

26%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt's scripts come in the form of "attack files" [6]; each plain text file ends with the .attack extension. Listing
26%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
| sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- This command string correctly prepares the -Shellcode parameter value. When passed to -Shellcode without specifying a process ID, the Invoke
26%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
in the Domain Name System and shows the IPv4 or IPv6 address to which they refer. Figure 1: A first call with just the domain of interest produces many
26%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
over the color for the bars (Figure 6). Figure 6: Histogram of the groups of readers as determined by cluster analysis. Visualizing Multiple
26%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
bottlenecks, not absolute speedup numbers for the whole codebase. Second, given more resources, you will usually process more data or do more work. Gustafson's law [6] provides an alternative formulation
26%
Updating Docker containers with Watchtower
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Alan on Unsplash
_SCHEDULE="0 0 */6 * * *" to the docker run command. As discussed earlier, if you use containers for which automatic updates are difficult or unreliable, you can also configure Watchtower simply to check
26%
Run applications in a containerized sandbox with Firejail
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Victor Zastolskiy, 123RF.com
then be propagated to sub-namespaces. The cgroups namespace supports abstracting control groups, namespaces, or both. The time namespace, which was only released in 2020 with kernel 5.6, cannot abstract real time
26%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
.1.3 Running hypervisor: QEMU 1.6.1 If access works, a few lines of Python are all you need to retrieve the desired information (Listing 2). The hypervisor hosts are defined in the hv array. In the following
26%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
. In general, the algorithm assigns data of an arbitrary length to a datum with a fixed length. Well-known examples are checksums with MD5  [6] or SHA-1 [7]. In the case of distributed data storage systems
26%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
. Git-annex Linux Magazine already featured the file synchronization software git-annex [6] just over a year ago [7]. The main advantage of git-annex compared with a plain vanilla Git solution

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice