Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1134)
  • Article (335)
  • News (251)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 173 Next »

9%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
for this example: Order Deny,Allow Deny from All Allow from 12.12.12.12 Allow from 23.23.23.23 Allow from 34.34.34.34 This example denies access to everybody except the IPs listed, which follows the very sensible
9%
News for admins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
CC BY 3.0
be in memory," said Guinet on the project page. The WannaCry ransomware attack has been the worst attack of its kind. The attack started on Friday May 12, 2017 and infected more than 230,000 computers across
9%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
": "glusterfs-cluster" 06 }, 07 "subsets": [ 08 { 09 "addresses": [ 10 { 11 "ip": "192,168,121,101" 12 } 13 ], 14 "ports
9%
Planned Obsolescence Needs to be Obsolete
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
out the window for tech that I'll have to replace in 12 to 18 months. And now we're told that certain vendors slow down tech that is only slightly out of date. That's taking planned obsolescence a bit
9%
Into the Cloud for Security
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Tomasz Pacyna, 123RF.com
to sleep at night knowing that your network is vulnerable, unwatched for at least 12 hours a day, and probably compromised so badly and so stealthily that you won't be able to find that you've been
9%
The Dilemma of the Ten-Second Commute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Larry Ewing (lewing@isc.tamu.edu) and The GIMP; Tux added protection by Maria
it that problematic. Yes, we spent a lot of time working. Rather than a typical eight to nine hours per day, we logged somewhere between 10 and 12 hours. We were also on call, and once the layoffs started in October
9%
Security is Everyone's Problem
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Rancz Andrei, 123RF.com
that the opposite is true. It's a little better than leaving the doors and windows unlocked but, in reality, not that much better. We assume that our 12-character complex passwords protect us, but they don't. Sure
9%
IMAP 4 protocol extensions
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Christian Draghici, 123RF.com
have been read   a002 OK [READ-WRITE] SELECT completed Client may make changes to mail a003 fetch 12 full   Client requests information about message 12
9%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
and architecture are available at http://www.lbl.gov/cs/html/greenflash.html, and you can read the complete research paper online at http://james.agu.org/index.php/JAMES/article/view/v3n12/v3n12HTML.
9%
The History of Cluster HPC
15.02.2012
Home »  HPC  »  Articles  » 
by multicore systems. Results for a 12-core (dual socket with six-core processors) server can be found here. These tests, which used a variety of numerical benchmarks, resulted in a range from 41% to 98

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 173 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice