Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (279)
  • Article (37)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 32 Next »

14%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
transaction 06 Installing : bzip2-1.0.6-13.el7.x86_64 1/4 07 Installing : libsss_nss_idmap-1.16.0-19.el7.x86
14%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
_NOT_RUNNING 08 fi 09 10 pid=`cat $ASTRUNDIR/asterisk.pid` 11 ocf_run kill -s 0 $pid 12 rc=$? 13 14 if [ $rc -eq 0 ]; then 15 if ocf_is_true "$OCF_RESKEY_realtime"; then 16
14%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
(msg.payload)) 07 08 mqtt = paho.Client() 09 mqtt.on_message = on_message 10 11 mqtt.connect("localhost", 1883, 60) 12 mqtt.subscribe("linux/+", 0) 13 14 mqtt.loop_forever() The client now connects
14%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
"conditions": [ 05 { 06 "type": "RuntimeReady", 07 "status": true, 08 "reason": "", 09 "message": "" 10 }, 11 { 12 "type": "NetworkReady", 13
14%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
rule phishing_pdf { 02 03 meta: 04 author = "James Stanger" 05 last_updated = "2017-09-12" 06 category = "phishing" 07 confidence = "high" 08 threat_type = "phishing exploit" 09 description
14%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
authentication_algorithm pre_shared_key; 08 dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15
14%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
_DATA=$1 06 07 # This is the Event Data 08 echo $EVENT_DATA 09 10 # Example of command usage 11 EVENT_JSON=$(echo $EVENT_DATA | jq .) 12 13 # Example of AWS command that's output will show up
14%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
.com/hashicorp/otto/examples/mongodb" 06 } 07 } 08 09 project { 10 name = "my-project" 11 infrastructure = "my-infrastructure" 12 } 13 14 infrastructure "my-infrastructure" { 15 type = "aws" 16
14%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
= kvmVM #specify the name 02 CPU = 1 # How many CPUs required? 03 MEMORY = 512 # RAM in MB 04 OS = [ 05 KERNAL = "/boot/vmlinuz-2.6.32-24-generic", # Kernel to use 06
14%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
     color: "Red", 11     Model year: 1988 12   } 13 }; Programmers can use variables directly; the appropriate var s are added by CoffeeScript when you compile. As in shell scripts, the hash sign (# ) starts

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice