Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 09 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (601)
  • Article (136)
  • News (9)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 75 Next »

93%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker ... 3
93%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [3] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ... 3
73%
A first look at Apache 2.4: Web server for the cloud
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Helder Almeida, 123RF.com
) as a reverse proxy. Although Apache is already being used in this way by quite a few organizations, it's clear that the 2.2 series is not optimized for that use case, which is one reason why Nginx is seeing ... High performance and cloud suitability are the thrust of Apache 2.4. We give you the lowdown on transitioning your Apache HTTP Server from 2.2 to 2.4. ... 3
70%
Tails: The Amnesic Incognito Live System
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
with applications that encrypt your files, email, and chat messages. Tails version 1.1 is based on Debian GNU/Linux and boots into the Gnome desktop version 3.4 in Fallback mode ... 22
70%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Organizations today often divide their local networks using switches, which operate Layer 2 of the OSI model, rather than the (Layer 3) routers for which the TCP/IP network protocol system ... 22
70%
Save and Restore Linux Processes with CRIU
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Valentin Volkov, 123RF.com
.1-rc2 and v1.1 followed soon after. Two more versions followed quickly, and when this article went to press, v1.3-rc2 was the most recent release. The following comments are based on the v1.1 release ... 22
70%
Live Kernel Update Tools
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Andrea, Fotolia.com
to be equivalent in terms of functionality: Kpatch [2] and kGraft [3]. Technically, the two approaches have major differences with widely divergent functionality. Perhaps this divergence is why Red Hat and SUSE ... 22
70%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
attractive possibilities exist: the virtualization of physical systems, including physical-to-virtual (P2V) operations, and the transfer of virtual machines to physical hardware (V2P) (Figure 3 ... 22
70%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Rgbspace, Fotolia.com
can find ReaR in the EPEL repo. SUSE Linux Enterprise includes ReaR packages but only in an older version. (Version 1.14 is also available for openSUSE [3], however, I experienced problems ... 22
70%
Tool your HPC systems for data analytics
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Sergey Nivens, 123RF.com
analytics is the combination of two concepts: "data analysis" and "analytics." Data analysis [3] is very similar to data analytics, in that it is the process of massaging data with the goal of discovering ... 22

« Previous 1 2 3 4 5 6 7 8 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice