Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 000 Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (281)
  • Article (92)
  • News (22)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 40 Next »

26%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
in practice, because Rancher comes with its own Kubernetes core distribution in tow in the form of K3s, which provides all the features you need. In this article, I guide you through the implementation
26%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS requests per second, a single DNS
26%
CloudStack's Chip Childers
29.10.2013
Home »  Articles  » 
 
bus for data/event collection and tracking, to greatly broadened VMware feature support, to the ever increasing number of SDN technology plugins shipping with the project. I'm looking forward to 4.3. I
26%
VMware is hit by lawsuit contending GPL violation
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sean Gladwell, Fotolia.com
of Linux kernel developer Christoph Hellwig. One of the 20 most prolific contributors to the Linux kernel, Hellwig has penned 279,653 lines of codes in kernel version 3.19. Hellwig also has expertise
26%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
still use the insecure SSLv3 or the even less secure SSLv2 76% use an untrusted SSL certificate 74% have an insecure SHA-1 signature 41% use an insecure key length of 1024 for RSA certificates
26%
CloudStack Up Close
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
with the project. I'm looking forward to 4.3. I just looked at a patch for integrating Juniper's OpenContrail with CloudStack, and other feature proposals are starting to hit the mailing lists now. 4.3 should
26%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
throughout the quarter, however, with 25,000 to 30,000 unique phishing email campaigns documented each month. According to the report, each campaign can involve hundreds of thousands or millions of pieces
26%
RSQL, a Microsoft SQL clone
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Eugenio Mazzone on Unsplash
Server for more than 15 years and like the product, but the license costs are exorbitant; for example, $14,400 for installation on an eight-core machine whose hardware only costs $3,000. The more powerful
26%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
to CloudFlare CEO Matthew Prince, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS
26%
Fundamentals of I/O benchmarking
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
. The measured values are then similar to those for sequential access. Each operation will cost a certain amount of overhead; therefore, the throughput results will be better for larger blocks. Figure 3 shows

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice