Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1562)
  • News (445)
  • Article (316)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 234 Next »

12%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
of data provided. Of course, PowerShell provides the necessary tool to collect the data. To access WMI objects, you use the Get-WMIObject cmdlet with the WMI object to be queried as a parameter (Listing 1
12%
Securing the TLS ecosystem with Certificate Transparency
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Bruce Rolff, 123RF.com
: Certificate Transparency, shown here in green, supplements the TLS/SSL procedure with an additional check by a log server. Log Access via Proxy Server Various service providers operate their own log
12%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
T) environment with Kafka. This scenario provides a good overview of the individual Kafka components and their interaction with other technologies. Figure 1: Kafka
12%
Forensic analysis with Autopsy and Sleuth Kit
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Tomasz Pacyna, 123RF.com
they analyze and describe the IoCs. If you receive STIX documents from partners or service providers (e.g., from platforms such as the threat sharing platform MISP [4]), you can test them immediately
12%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
cases, you will hear about the benefits of virtualization, the added security that isolating individual machines can provide, and how easy it is to revert to previous versions at any time with snapshots
12%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
. In this way, you'll be able to host and serve data requests, so long as a single node of the cluster remains online. High Availability As we depend more and more on technology and the services it provides
12%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
software response as well as hardware reliability and its behavior under load. The latest release provides a menagerie of 300 stressors crafted to load the CPU (with a variety of more than 80 tests), memory
12%
News for Admins
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
 
on the edX platform. According to the website, the course focuses on providing managers and leaders with an overview of the history, terminology, processes, and tools used to implement a DevSecOps approach
12%
News for Admins
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
to the aggregation data centers." Barcet concludes with, "What we need to offer as a software infrastructure provider is all the components to build according to the topology that the customer wants for that use case
12%
News for Admins
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
 
User Dispatch (SUD), which provides functionality for compatibility layers for quick capture of system calls issued by a non-native part of an application. This addition will greatly improve Windows

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 234 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice