Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (8)
  • Article (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year
100%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... is easy enough (superuser privileges are required): arp -s 192.168.90.55 00:0c:29:c1:91:b1 The last field of the command is the MAC address, which is the unique identifier of the network device to which
98%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... : [devuan] 10 donkey: 11 user: root 12 host: donkey.operationalsecurity.es 13 tags: [devuan] 14 zebra: 15 user: root 16 host: zebra.operationalsecurity.es 17 tags: [devuan] 18 19
25%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
, mostly around HPC, and makes them easier to use and share. XSEDE’s services and tools allow the various facilities to be federated and shared. You can see a list of the resources on their web site. It
25%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
=$dbh->prepare('select burncpu(?)'); 12 $sth->execute((($ENV{QUERY_STRING}+0) || .5).'s'); 13 14 while( my $row=$sth->fetchrow_arrayref ) { 15 print "@$row\n"; 16 } Workaround The script is simple, but the attentive
23%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
22%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
 Recheck: 978 11    ->  Bitmap Index Scan on mail_msg_idx  (cost=0.00..128.03 rows=4 width=0) 12    (actual time=34.925..34.925 rows=1650 loops=1) 13          Index Cond: (msg ~ '(updatable|views)'::text) 14
22%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
_ADMIN=admin 10 - KEYCLOAK_ADMIN_PASSWORD=SOME_PASSWORD 11 - KC_DB=postgres 12 - KC_DB_URL=jdbc:postgresql://postgres:5432/keycloak 13 - KC_DB_USERNAME=postgres 14 - KC
22%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
understand how shaping or throttling works with tc: When shaping a 10mbit/s connection to 1mbit/s, the link will be idle 90% of the time. If it isn't, it needs to be throttled so that it IS idle 90
21%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
-> Bitmap Index Scan on mail_msg_idx (cost=0.00..128.03 rows=4 width=0) 12 (actual time=34.925..34.925 rows=1650 loops=1) 13 Index Cond: (msg ~ '(updatable|views)'::text) 14 Total runtime: 175
21%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
}] | |-kata-shim---7*[{kata-shim}] | | `-10*[{containerd-shim}] | `-14*[{containerd}] $ $ docker exec -it kata-fc sh / # / # uname -r 5.4.32 Behind the Scenes An installation of Kata

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice