Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 154 Next »

11%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
that the user is editing in the URL, whereas the HTTP method maps the applicable actions. At a logical level this means, figuratively, that the call DELETE http:// removes
11%
Setting up MariaDB replication with the help of XtraBackup
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Kran Kanthawong, 123RF.com
disadvantages. For example, values provided by user-defined functions or stored procedures can differ from call to call. An example would be now(). If this statement is repeated on the slave, it must produce
11%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
(hypervisor) controlling the operation of virtual machines, called instances. The most common reason for integrating a cloud controller with a network node on the same server is the small size of the cloud
11%
Opportunities and risks: Containers for DevOps
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ping Han, 123RF.com
is that a fresh container based on an official image supplies the desired function after the tool is called. For a change, the developer, not the admin, is responsible for the bulk of the work. In many cases
11%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
and not immediately on the block device. Data pages modified while in the page cache are called "dirty pages," because the modified data has not yet been written to persistent storage. Gradually, the Linux kernel
11%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
RPC (remote procedure call, originally created by Google) endpoint for each individual Talos node that lets you import a node-specific configuration. On the userspace side, you use a counterpart named talosctl
11%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
be detected this way because "there is only one behavior – a call to the LLM." Additionally, "LLM resource consumption will vary greatly across individual users and, therefore, it is difficult to differentiate
11%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
move on to configuring the replication setup, it is a good idea to call up the SQL Server Configuration Manager and go to SQL Server Services to make sure the SQL Server Agent service is configured
11%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
a server with requests until it stops working. This attack is easier said than done, because servers usually have more power in reserve than a single client can call up. The obvious idea is to attack
11%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
setup is basically simple: Postfix receives an incoming email and forwards it to Amavisd, which then calls SpamAssassin, ClamAV, and other components and lets them check the entire content of the email

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice