Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"500 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1014)
  • Article (292)
  • News (151)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 147 Next »

23%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
the following command with swap turned off (swapoff -a) and watch the fireworks: stress-ng --brk 2 --stack 2 --bigheap 2 Colin has presented his work at several Linux Foundation events, and slides [6
23%
Pattern matching dispute in Python 3.10
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Steve Harvey on Unsplash
to receive such a match expression. The Python enhancement proposal (PEP) 634 [4] describes the implementation. More information about the plans can be found in PEP 635 [5] and PEP 636 [6]. How pattern
23%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
Emergency Readiness Team (US-CERT), for example, recommends the 3-2-1 backup principle [6]: three copies of the data, one production copy, and two backups, divided between two different media (e.g., hard
23%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
methods are suitable for finding credentials in the wild. For instance, intruders can use a tool called shhgit [6] to find secrets and sensitive files across GitHub code. The attacker can now send a fake
23%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
. The container cannot write to them, thus preventing privileged processes in containers from manipulating the host system. The kernel breaks down root privileges into capabilities [6] and assigns capabilities
23%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
player can also cope with protected Blu-ray discs, thanks to the keys, and you can use the menu in many cases. HandBrake For many years, the continuously updated HandBrake [6] has been regarded
23%
Setting up DevOps Orchestration Platform
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © J¸rgen Acker, Photocase.com
.9.5) [5] Ansible 2.8.1 Python 3.6.9 Python 2.7.17 Terraform v0.12.0 Golang: go1.10.4 linux/amd64 [6] For a list of current restrictions and limitations, see the "Limitations" box
23%
Multiprocessing in Python with Fortran and OpenMP
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Photo by Zachary Young on Unsplash
as Python modules with tools such as SWIG [6], Pyfort [7], and F2PY [8]. Writing parallel functions in Python is very difficult, but it's fairly straightforward in C and Fortran with the use of a variety
23%
New plans for Jenkins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Juergen Priewe, 123rf.com
of the already existing future-oriented projects in the Jenkins universe. Jenkins Evergreen [6], the automatically updating rolling distribution system, is an attempt to get away from the Lego principle
23%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
) from one place. More about master and member GuardDuty accounts can be found online [6]. You can also configure and pull in lots of less privileged users from member accounts who can view findings

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice