Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 213 Next »

18%
Serverless applications with OpenFaaS
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kier in Sight Archives on Unsplash
-cli new command. This command builds a Docker image, pushes it, and deploys the function in one step (Figure 3). Ensure you're logged in to a container registry or use the OpenFaaS default (pushes
18%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
viewer Yes No No Calendar hosting Yes No No Audio/video streaming MP3 streaming integrated in browser client No (except with third
18%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
to access the network without any restrictions. Windows supports NAP for Windows XP SP3 with some restrictions, which no longer apply to versions as of Windows Vista. Many Roads Lead to Rome Various types
18%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [3], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
18%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
crack attempt using the supplied password list file, password.lst. This list contains more than 3,000 commonly used passwords (Listing 2). Listing 2 Cracking with the Password List File 01
18%
S.M.A.R.T., smartmontools, and drive monitoring
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © _fla, 123RF.com
). Smartmontools is compatible with all S.M.A.R.T. features and supports ATA/ATAPI/SATA-3 to -8 disks and SCSI disks and tape devices. It also supports the major Linux RAID cards, which can sometimes cause
18%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
 def    # # Routine to add commas to a float string # def commify3(amount):     amount = str(amount)     amount = amount[::-1]     amount = re.sub(r"(\d\d\d)(?=\d)(?!\d*\.)", r"\1,", amount)     return amount[::-1
18%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
correctly within my ability to test a range of packages. I tested the script with a couple of versions of Python as well: 2.6.x and 2.7.x, but not 3.x. The script is offered up as is with no real guarantees
18%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
version of Vyatta, most notably VyOS [3]. The fork was successful, because VyOS includes all the DMVPN components: dynamic routing with high availability on top. EdgeOS Another player in the Vyatta market
18%
RESTful APIs in practice
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Michal Bednarek, 123RF.com
three to examine in this article. Two are popular Internet services from Twitter [2] and WordPress [3]. Because of the high number of users and open interfaces, you can expect an affinity with REST

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 213 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice