Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: cach hand Play Together 1.22 0(711bmw.com)cach hand Play Together 1.22 0(711bmw.com)w0e ?

Refine your search
  • [x] Content type: Article (Print)
Sort order
  • Date
  • Score
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 21 Next »

9%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
.12.6) DSM 5.0-4493 Update 5 (Linux 3.2.40) Thecus OS 5.0 (Linux 3.10.47) ReadyNAS OS 6.1.9 Price (without disks,EUR incl. VAT) $350/EUR390 $300/EUR250 $370/EUR430
9%
Unprecedented built-in support for diverse languages
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Yang MingQi, 123RF.com
, then the English version will be shown when the visitor goes to the page's URL containing no ISO language code (e.g., http://example.com/node/1). The Spanish version would be viewable at http://example.com/es/node/1
9%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
-socket-container 0 16ee465d1120a docker-socket-pod 38e1eb8945613 5e785d005ccc1 2 hours ago Running calico-kube-controllers 334 897bae6c4ca20 calico
9%
Native serverless computing in Kubernetes
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Adam Bixby on Unsplash
-go in the default namespace. The service specification states that the helloworld-go image from docker.io (i.e., from Docker Hub) runs the service. The TARGET environment variable containing Go Sample v1 is also set
9%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
, fetches the complete Tsunami source code along with the code for the available plugins, builds the Tsunami binary, and finally executes it on IP address 127.0.0.1. After the call, you will find the tsunami
9%
The path forward
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
 
The past 12 months have been a whirlwind of change for SUSE. Former parent company Micro Focus announced last July that it was spinning off SUSE as an independent company  [1]; since then
9%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
three service qualities to make sure messages are transmitted. These guarantees range from no assurance (Level 0) to assurance that the message at least arrive once (Level 1), to the promise
9%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
://en.wikipedia.org/wiki/Max_Schrems "Digital Sovereignty," Friederike Zelke, editor. The Cloud Report , issue 1/2022: https://the-report.cloud/downloads Four Opens: https://openinfra.dev/four-opens OSS Health Check: https://github.com
9%
When you should and should not use NoSQL databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Artem Gavrysh on Unsplash
available and also partition-tolerant, but not always consistent. It's up to you to decide. If consistency plays the main role for you (e.g., for financial software), you will probably prefer a relational
9%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
troublemakers, the list does not take into account the individual attack situation, which is where dynamic blocking with Fail2Ban [5] comes into play (Figure 1). The tool assumes that every IP address

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice