Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (690)
  • Article (208)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 102 Next »

17%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
to the OWASP page with video help [1]. The User Guide link on that page jumps to the GitHub page [12], which is the official site and the most useful starter page, for beginners. For up-to-date images, you can
17%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
referred to as "router advertisement": enable-ra dhcp-range=tag:eno1,::1, constructor:eno1, ra-names, 12h If needed, you can specify additional DHCP options (according to RFC2132) that you want to pass
17%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
). By default, a session expires automatically after 12 hours. To continue, just press the Click login to continue button and log in again. You can also set your own time limits for sessions according to your
17%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
_init_remote(&unw_cursor, g_unw_as, unw_ctx)); 05 06 /* - Search - */ 07 bool found_stack_entry = false; 08 do { 09 unw_word_t ip = 0; 10 unw_get_reg(&unw_cursor, UNW_REG_IP, &ip); 11 12 Dwfl_Module* module = dwfl
17%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
) that addresses cybersecurity with neural network models. The SDK, called Morpheus [12], is "… an open application framework that enables cybersecurity developers to create optimized AI pipelines for filtering
17%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
generated by the user: mysql> create user 'user'@'localhost' identified by 'password' - > with max_queries_per_hour 15 - > max_updates_per_hour 12 - > max_connections_per_hour 4 - > max
17%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
://cfengine.com has a Quickstart Guide with mini-documentation, whereas http://docs.cfengine.com has the official documentation. An archive [12] also houses a hodgepodge of old manuals, some of which are easier to read
17%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
for 30 days and can be renewed by downloading a new key [12]. The proprietary part of the software embeds the keys it uses to decipher commercial Blu-ray discs. Because the application can convert video
17%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
": "Allow", 06 "Action": "logs:CreateLogGroup", 07 "Resource": "arn:aws:logs:eu-west-1:XXXXXXX:*" 08 }, 09 { 10 "Effect": "Allow", 11 "Action": [ 12 "logs
17%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
Account 11 name: testserviceaccount 12 roleRef: 13 kind: Role 14 name: pod-reader 15 apiGroup: rbac.authorization.k8s.io Role Behavior If you want to manage what a user can access, you need

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 102 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice