Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (112)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 150 Next »

25%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
-sent:           22,334 (total)              0/s  (Per-Sec)    pkts-recv:           68,018 (total)              2/s  (Per-Sec) lo    Bytes-sent:          2.55 K (total)         0.00 B/s  (Per-Sec)    Bytes
25%
SUSE Announces Rancher Prime 3.0
21.03.2024
Home »  News  » 
 
SUSE has announced enhancements to its open source cloud native and edge solutions with the release of Rancher Prime 3.0 and SUSE Edge 3.0. Rancher Prime 3.0, which is the commercial version ... SUSE Announces Rancher Prime 3.0
25%
Huge DDoS Attack over HTTPS is Discovered and Stopped
03.05.2022
Home »  News  » 
 
The security company Cloudflare has announced that it detected and mitigated a 15.3 million request-per-second (rps) denial of service attack, which the company called “one of the largest HTTPS ... Huge DDoS Attack over HTTPS is Discovered and Stopped
25%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
 -s 12:00:00 -e 13:00:00 Linux 3.5.0-43-generic (hercules)         02.12.2013      _x86_64_        (2 CPU)    12:05:01        CPU     %user     %nice   %system   %iowait    %steal     %idle 12
25%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
jcb@hercules:# sar -u -f /var/log/sysstat/sa02 -s 12:00:00 -e 13:00:00 Linux 3.5.0-43-generic (hercules) 02.12.2013 _x86_64_ (2 CPU) 12:05:01 CPU %user %nice %system
25%
Amazon to Offer DDoS Protection of AWS Users
07.12.2016
Home »  News  » 
 
During the AWS re:Invent conference, Amazon announced AWS Shield, a managed service that protects web applications against DDoS (Distributed Denial of Service) attacks. It’s similar to what sites ... As the biggest public cloud provider, Amazon is responding to the increasing number of DDoS attacks. ... Amazon to Offer DDoS Protection of AWS Users
25%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
Fortran comprises a huge body of software in high-performance computing. We look at Fortran’s evolution into a modern HPC language. ... writing code. Columns 1 to 5 could be used for statement labels such as the following: ...       SUM = 0.0       D0 100 I=1,10          SUM = SUM + REAL(I)  100  CONTINUE ...       Y = X1 + X2 + X3 ... Fortran comprises a huge body of software in high-performance computing. We look at Fortran’s evolution into a modern HPC language.
25%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
There’s no such thing as a homogeneous server environment. Windows administrators must learn basic Linux commands and navigation to support a contemporary network fully. ... . That’s a good thing for cross-platform system administrators who must work on a variety of systems without becoming an expert on every one. By convergence, I mean that there is more of a standard look ... There’s no such thing as a homogeneous server environment. Windows administrators must learn basic Linux commands and navigation to support a contemporary network fully.
25%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
Hardly a day goes by without reports of hackers breaking into government, military, or enterprise servers. If you analyze the details of the hacker’s approach, you will see that, in 90 percent ... is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real ... Hardly a day goes by without reports of hackers breaking into government, military, or enterprise servers. If you analyze the details of the hacker’s approach, you will see that, in 90 percent
25%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... to CloudFlare CEO Matthew Prince, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, which allows them to work around conventional defense mechanisms. We explain how a DDoS attack

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice