Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1444)
  • Article (117)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 168 Next »

35%
Securing the TLS ecosystem with Certificate Transparency
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Bruce Rolff, 123RF.com
. Infos Censys certificate report: https://censys.io/certificates/report?q=tags%3Atrusted&field=parsed.issuer.organization.raw&max_buckets=50 CaliDog GitHub repository: https://github.com
35%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
the slices, the higher the precision. You just need to throw CPUs at the problem: in this case, 5 million loops to reach 48 decimal places of accuracy. Figure 1
35%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
additional libraries and options into the linker command line to intercept relevant I/O calls" [2] (section 5.1). For MPI applications, you can also profile pre-compiled binaries. It uses the LD
35%
Security boundaries in Windows
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Jan Canty on Unsplash
vulnerabilities that affect these boundaries. Infos Microsoft Security Servicing Criteria for Windows: https://www.microsoft.com/en-us/msrc/windows-security-servicing-criteria
35%
Run applications in a containerized sandbox with Firejail
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Victor Zastolskiy, 123RF.com
then be propagated to sub-namespaces. The cgroups namespace supports abstracting control groups, namespaces, or both. The time namespace, which was only released in 2020 with kernel 5.6, cannot abstract real time
35%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
website [2]. The OCS project documentation [3] and forum  [4] will help you get started installing and configuring OCS. OpenNMS The OpenNMS network management platform [5] was predominantly developed
35%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
messages to the nodes involved, and supports locking of storage objects. In the standard configuration, Sheepdog is set up for Corosync [4]. Alternatively, you can also use Zookeeper  [5]. During compilation
35%
PowerShell OSDBuilder module
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Shubham Dhage on Unsplash
a newish version of Windows 10 21H1 (build 19043.1320) running on a virtual machine on VMware Workstation 16 for this example. The PowerShell commands were tested in both version 5.1, which is found
35%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
from silos and toward a holistic integrative approach. Infos Cost of a Data Breach Report 2021: https://www.ibm.com/security/data-breach The Author Steffen Eid is a Manager
35%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
this problem. File I/O can therefore be a highly relevant factor for program optimization. The libiotrace [4] library uses LD_PRELOAD to gather data about POSIX [5] and MPI [6] file I/O functions. Although other

« Previous 1 ... 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 168 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice