Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 148 Next »

13%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
ME!" citizenstig/nowasp As you will note, you're opening up at least one low-level, privileged network port. Don't be surprised if you have to sudo or become root to run the command. Figure 1 shows
13%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
of the memory is being used for user applications, and what the network is doing and whether it is being used for applications. This information can help you understand where you need to make changes
13%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
marketing and some very nifty networking improvements, have driven Docker to the forefront of techies' minds and helped Docker ride on the crest of the DevOps wave. Docker provides businesses at all levels
13%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
easily. Another technique for using pdsh is to run scripts on each node. For example, in previous articles on processor and memory metrics [4] and on process, network, and disk metrics [5], scripts were
13%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, the request first passes through many routers to its destination. All told, this generates massive overhead, especially in terms of energy consumption for communication. The more branches the network has
13%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
, and networks), all of which fire up containers to run the respective services. To do just that, use the command: $ docker-compose up -d Incidentally, the -d runs the containers in the background, or daemonizes
13%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
. Tap-Proof TLS and SSL are cryptographic network protocols. (Actually, they are collections of several protocols.) TLS encrypts the data provided by the browser and then sends the data to a web
13%
SSH tools for Windows
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Maksim Kabakou, 123RF.com
SourceForge [12], and the current version is 0.74 (see also the "WinSSH" box). Installing the executable binary needs no explanation; no launcher is needed because Swish simply appears as a new network
13%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
used for local decisions about a system but become much more powerful as a means of projecting trust across a network when integrity evidence can reliably be presented as input to remote security
13%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
of slapping some boxes together with a network and calling it a day. This might work with flashmob computing, but if you've followed this series, you realize this is not the usual case. If you want to put

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice