Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 154 Next »

13%
Controlling Amazon Cloud with Boto
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Claudiarndt, photocase.com
balancer or removes them depending on the load. The Boto library includes modules for every service Amazon offers. Thus, besides EC, it includes the basic services, such as Secure Virtual Network
13%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
: Accepting the License Agreement Personalize Color Scheme and Name the Computer Select a Wireless Network Enter the Wireless Network Password Set Express or Custom Settings Sign In to Your PC
13%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
determine CPU utilization or free RAM, the number of network packets transmitted, or the speed of disk I/O. Installation Sar is included in the repositories of all well-known Linux distributions
13%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
, and systemd. Drawing on more tools from the libguestfs package, virt-builder modifies the template to suit the administrator’s needs – for example, setting the root password, configuring the network, and so on
13%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
to allow access to a terminal. Here, I start a netcat listener on the Linux box and connect to it with: $ ncat 10.9.11.32 5555 Again, I can use -- ssl to hide my conversation from a sniffer on the network
13%
Book Review: Land of Lisp
14.09.2011
Home »  Articles  » 
 
in their Computer Science track coursework. Just in my local neighborhood, I can point to a major airfare engine and an even larger distributed network infrastructure provider that makes use of Lisp code
13%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
and integrity requirements. Traditional availability hasn't really been addressed by the security side of operations; instead, this is usually left to the server and network admins, at least until an attack takes
13%
Killing Instances with Chaos Monkey
28.06.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
by pushing your code to CloudServers or EC2. Resilience is built in at the hardware level in most cloud offerings. Disks fail, network connections drop out, and through the magic of your cloud provider, you
13%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, real-time updates, and the appearance of 10Gb networks (or even some 100Gbps backbones) have changed the shape of the web. The IETF Working Group “Hypertext Transfer Protocol Bis (httpbis)” is looking
13%
Container Apps
02.10.2017
Home »  Articles  » 
 
 core  or ubuntu-core  snap. It offers other snaps a read-only filesystem that can also rely on basic libraries, an init package (systemd), and networking. This is called an OS snap,because it is a minimal

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice