Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1184)
  • Article (265)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 150 Next »

19%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before
19%
The 12 best tricks for Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Graphic Designer, Fotolia.com
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick 3 Virtual Domain Controller -- Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
19%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
and performance of the user’s workload, I don’t see a problem using it. Example 3: Setting Temporary I/O Directories Very close to the previous example is one that creates temporary directories for the user
19%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
is the community open source version of the project, and Alien Vault Unified Security Management (USM) [3] offers even more in the way of features, scalability, and support. Additionally, it is worth noting that all
19%
Deis combines Docker and CoreOS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © jager, 123RF.com
efficiency, along with simpler management, explains the meteoric rise of Docker [3], LXD [4], OpenStack [5], and other container-based tools: Everything called a "container" is currently very popular
19%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
an alternative that has more security. SSHFS Filesystem in Userspace (FUSE) [3] offer several attractive features. Such filesystems are easy to code because they are in user space (have you tried getting
19%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
[6]: In a MAT system based on InfluxDB, this service collects the metrics on the servers and passes them to InfluxDB for storage. Telegraf (Figure 3) is similar to Prometheus Node Exporter in the same
19%
Manage cluster state with Ceph dashboard
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © damedeeso,123rf.com
in the background, as is the dashboard, ceph-mgr [3]. The somewhat unwieldy short form of the framework is now part of the standard installation in a Ceph deployment, and most Ceph products install the dashboard
19%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
a certification program, FIDO Ready  [2], for passing its standards testing. At the 2014 CES (Consumer Electronics Show), early implementation by vendors AGNITiO [3], FingerQ [4], Go-Trust [5], Nok Nok Labs [6
19%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
Software services packaged as containers finally reached the remotest corners of IT about three years ago. Docker [1], rkt [2], LXC [3], and the like see themselves confronted with technologies

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice