Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (922)
  • Article (319)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 135 Next »

15%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
parameters, and it can provide potential attackers a vector for an attack or monitoring. To increase the security, access was restricted to just 30 parameters – compared with the 3,000 parameters that sysctl
15%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
(Figures 1-3). You can also get the prefabricated drives in computational storage drive (CSD) and NVMe SSD+ (NSD) flavors, the later of which does not have the capacity multiplier feature of the CSD
15%
Fixing Ceph performance problems
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kritiya Sumpun, 123RF.com
. Only when the object has arrived in the journals of as many OSDs as the value size specifies (3 out of the box) is the acknowledgement for the write sent to the client, and only then is the write
15%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
on the disk. Manual changes to the nodes in the cloud are automatically prohibited, because they are not easily reproducible (Figure 3). Replaceable systems – To make it easier to remove and reinstall
15%
Migrating your network to IPv6
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jarts, PHOTOCASE.com
introduce IPv6 gradually and systematically. Three rollout alternatives that have proved useful are core-to-edge, edge-to-core, and IPv6 islands. The core-to-edge approach (Figure 3) involves first migrating
15%
Synchronizing repository changes with GitOps
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
, for example, an Amazon Simple Storage Service (S3) bucket: If you accidentally delete it, you can recreate it later when you discover your mistake (provided someone else hasn't used that particular bucket name
15%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
appliances including load balancers, two further Windows clusters need to be managed. First, there is the Model Manager Cluster, which is responsible for storing the Infrastructure as a Service (IaaS) data
15%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
also acts as a USB-to-UART/SPI/I2C adapter and supports Bluetooth spamming. This low-energy denial-of-service (DoS) attack can be used to crash iPhones and iPads in particular. Devices with iOS 17
15%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
in the form of a master boot record (MBR) or a GUID partition table (GPT) [3]. The tricks the expert used to revive RAID systems (Figure  1) did not help: Neither fdisk nor mmls – the forensic counterpart from
15%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
protocol, attached to HTTP(S), accepts requests on defined ports via a listener. The guest and host are thus confined to communicating through some form of virtual networking. Another option for VM

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 135 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice