Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (93)
  • Article (35)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13

13%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before
13%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
when a user leaves. checkCertWithoutUser.pl and revoke_and_delete (called in Listing 4, line 2) [6] get rid of certificates after some time has elapsed (Figure 3
13%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
allows you to define a 18 # character to toggle this mode off and on. 19 set force_conservative 0 ;# set to 1 to force conservative mode even if 20 ;# script wasn't run
13%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
on the Internet. After Spamhaus commissioned cloud security provider CloudFlare [3] to defend its infrastructure, it was able to resume its usual services. The attackers, however, didn't give up. A week later
13%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
flood of data used by legacy DDoS attacks in previous years (also see the “What Is DDoS?” box). According to a survey by Arbor Networks, typical bitrates in DDoS attacks last year were around 1.48Gbps
13%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
of 3.2, 3.84, 6.4, and 7.68TB. Similarities The central difference between the CSD and NSD drives is the capacity multiplier, as mentioned; beyond that, the devices offer the same set of basic features
13%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
selected the wordpress:php7.2 and mysql:5.6 images (which I'll call the "production" deployment) from Docker Hub for my containers. To run it as a microservice, I deployed it as shown in Figure 3
13%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
the data that was gathered with this command: ossiot "mpirun –np 2 ./sweep3d.mpi" In Figure 6, I present an example of the event-by-event list view using the GUI, when the Event List EL icon is selected

« Previous 1 ... 6 7 8 9 10 11 12 13

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice