Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • Article (37)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 Next »

22%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
(Accelerated Processing Unit) [4]. This processor combines a CPU with a GPU on a single chip. For example, the recently announced AMD A10-5800K has the following specifications: 4 cores at 3.8GHz (turbo
22%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
public_key = "${file("${var.ssh_pub_key}")}" 07 } 08 resource "digitalocean_droplet" "mywebapp" { 09 image = "docker-16-04" 10 name: guest 11 region = "fra1" 12 size = "512mb" 13 ssh
22%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a
22%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
  (  1.28%)  ( 39.62% cumulative)    [ 365- 504 days]:   2324  (  0.60%)  ( 40.22% cumulative)    [ 504- 730 days]:   3270  (  0.84%)  ( 41.06% cumulative)    [ 730-1095 days]:  37909  (  9.77%)  ( 50.83% cumulative)    [1095
22%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
the as-a-service offerings. For example, the Kubernetes-as-a-service offerings, such as Google Kubernetes Engine [1], Amazon Elastic Container Service for Kubernetes (EKS) [2], and Microsoft Azure
22%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Number: 00282-30340-00000-AB9A5 Version: 6.3.9600 The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
22%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
thus assumed an upgrade scenario that included replacing the motherboard with on-board graphics and sound, the CPU, the RAM (1,024MB), and the hard disk (320GB). After investigating prices, the authors
22%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
- 4B760828 emi- E0A3107A 192.168.1.101 172.19.1.3 pending mykeypair 0 m1.small 2011- 03- 09T16:22:36.864Z cluster1 eki- F7111106 eri- 0B641162 04
22%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
.1_release_notes oVirt Installation Guide: http://www.ovirt.org/w/images/a/a9/OVirt-3.0-Installation_Guide-en-US.pdf
22%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
command: # sockstat | grep "\*:[0-9]" The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service: inetd_flags="-wW -a

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice