Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 83 Next »

9%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
the conditions for the rapid growth of the Internet in the 1990s, as the algorithms maximized throughput, minimized delays, and ensured low losses (Figure 1). The source and target TCPs attempt to determine
9%
Logical Bombs for Fun and Benchmarking
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
.html top (1) man page: https://manpages.ubuntu.com/manpages/bionic/en/man1/top.1.html Amazon CloudWatch: https://aws.amazon.com/cloudwatch/ fork (2) man page: https://manpages.ubuntu.com
9%
VMware is hit by lawsuit contending GPL violation
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sean Gladwell, Fotolia.com
, he began to prepare this case. Background As a maintainer of Linux SCSI storage, Hellwig in 2006 [2] let VMware employee Zachary Amsden know rather bluntly on the kernel mailing list that he
9%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
to the acknowledgement number (ACK). The use of the timestamp as a carrier is also conceivable. Listing 1 TCP Header 01 $ cat rfc793.txt 02 ... 03 0 1 2
9%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
at aggregation and distribution level, to achieve short convergence times in case of failures (Figure 2). Figure 2: The root bridge of a network should reside
9%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
?" The second is, "How do I create a W2G USB drive?" Once you have the USB drive in hand – or in pocket – many other questions arise about licensing, portability, and security. In this article, I'll answer all
9%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
). (3) In other words, if you replace R by the service time S on the right-hand side of Equation (2), the output volume on the left-hand side is equal to the utilization (rho). In the late 1970s
9%
Best practices for KVM on NUMA servers
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Joe Belanger, 123RF.com
Viewing Server Topology 01 # numactl --hardware available: 8 nodes (0-7) node 0 cpus: 0 1 2 3 4 5 6 7 8 9 node 0 size: 16373 MB node 0 free: 15837 MB node 1 cpus: 10 11 12 13 14 15 16 17 18 19 node 1
9%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
-local network – in this specific case, 10.5.0.0/24. The thick black line in the figure represents the VPN tunnel over the Internet. Figure 1: Architecture
9%
Migrating your network to IPv6
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jarts, PHOTOCASE.com
, restricted, no IPv6 capability Importance of the system in case of failure – on a scale from 0 to 5 It is also of utmost importance to determine the mutual dependencies of the components. For example

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice