Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 ... 148 Next »

13%
Containers made simple
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Nathan Cima on Unsplash
and networks and for creating persistent volumes can be found in the menu on the left, but you don't have to use them. As your knowledge grows, you can create networks and storage volumes implicitly when you
13%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
in containers are connected to the local network, more doubts raise their ugly heads. Because containers are designed out of the box not to be bound to the IP addresses of the host system, Docker and others use
13%
MinIO: Amazon S3 competition
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © zelfit, 123RF.com
that can be connected to MinIO can be considered – including official Amazon S3 or devices that speak the S3 protocol, such as some network-attached storage (NAS) appliances. Encryption Included The role
13%
Setting up the lightweight Lighttpd web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Brett Jordan on Unsplash
.4.56 or later support the newer HTTP/2. Because of its small footprint, Lighttpd is often used on smaller or less powerful systems. For example, it is the engine for the popular Pi-hole [2] network filter and ad
13%
Web-based reconnaissance
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Wayne Daniels, 123RF.com
attackers to find them and attempt to gain access to an organization's internal network by compromising weak credentials through malware and phishing attacks. This module uses the content of the domains
13%
How persistent memory will change computing
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © rangizzz, 123RF.com
won't be able to access the data on the server. Additionally, you have to consider moving data from the network interface to PM via the filesystem. With PM, you have extremely fast storage, and the I
13%
MariaDB MaxScale: A smart proxy for MySQL
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
-defined network (SDN) implementations are often responsible for latency that is significantly above that of Ethernet. From version 1.3 on, MaxScale supports persistent database connections to its back ends. Max
13%
Spam protection using SpamAssassin
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
, so you can determine which detection methods are used (e.g., Bayesian filtering, the network test, or the whitelist). SpamAssassin comes with simple text files containing a standard set of rules. Both
13%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
applications include all kinds of social networks (who with whom, when, and where). The storing of groups, documents, or project structures also benefits from flexible mapping of complex dependencies and cross
13%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
cleartext protocols, attackers could sniff HTTP packets if they're on the same network as the victim (or between the victim and web server). To identify this flaw in your own application, you can use Cookie

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice