Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 171 Next »

12%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
in the first line. If you do not have a public domain or are trying out the setup on your local network, remove the hash in line 3. Caddy will then use self-signed certificates. Alerta is then accessible
12%
vSphere 5 vs. XenServer 6
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kozinia, 123RF.com
Availability VMware completely reengineered clustering services, such as VMware high availability (HA), for vSphere 5. In the past, an isolated host could cause issues, creating a network failure, interrupting
12%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
the important remote network tools (e.g., SH, RDP, VNC, Telnet, Rlogin, FTP, SFTP, and XDMCP). X11 forwarding is supported by OpenSSH. The full MobaXterm package thus consists of the embedded X server, the tab
12%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
on that same system. One day, I decided to turn them all on at once. To my surprise, they all had their own IP addresses and their own identities. I had a virtual network running on a single hunk of hardware and
12%
BlackHat USA 2010
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
is not so much a failing within SSL, but unless you're taking extreme measures to protect network traffic against analysis (e.g., padding traffic out, introducing time delays, etc.), chances are, attackers
12%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
of a Network Area Storage (NAS) appliance. Each appliance will adhere to the NFS protocol, but poor performance can greatly limit the true potential of a cluster. A similar situation exists for network
12%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
, the network components, or any active applications. The study might also include file paths to confidential data or configuration files. Of course, the security of encryption and cryptographic signatures
12%
Interview: Hardware or Cloudware?
10.04.2012
Home »  HPC  »  Articles  » 
to seamlessly create the illusion that there was just one computer. And that went through multiple iterations – in the ’70s with distributed computing, in the ’80s with network computing, in the ’90s with network
12%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
-learning library, which supports GPU acceleration for deep convolution networks. We’re in the process of porting several machine-learning libraries and tools. Many of these tools were written with CUDA, and we can
12%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
.zones 27 network = data.terraform_remote_state.vpc.outputs.network_name 28 subnetwork = data.terraform_remote_state.vpc.outputs.subnets_names[0] 29 ip

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice