Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%3&00 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (407)
  • Article (141)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 59 Next »

18%
Set up subdomains with Apache and Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Saniphoto, Fotolia.com
89.221.14.204... Connected to www.wintermeyer.de. Escape character is '^]'. GET / HTTP/1.1 HOST: www.wintermeyer.de HTTP/1.1 301 Moved Permanently Server: nginx/1.10.3 Date: Fri, 27 Nov 2020 14:00
18%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
the servers to the console through the agent. (3) Use "bouncers" to prevent attacks actively, wherein the system simply blocks certain IP addresses. Typically, you can use the package manager to install Crowd
18%
Jelastic: Java and PHP as a service
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Melinda Nagy, 123RF.com
in line with enterprise standards but who are not necessarily IT geeks. The dogado tariff system treats each computing service as a cloudlet, which is equivalent to 128MB of RAM, 200MHz of CPU, and many
18%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
cannot be parallelized). For one process, the wall clock time is assumed to be 1,000 seconds, which means that 200 seconds of the wall clock time is the serial portion of the application. From Amdahl's Law
18%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
SCO components on a single computer make sure you comply with the following hardware requirements: Minimum 1GB RAM, 2GB RAM recommended 200MB available hard disk space Dual-core processor
18%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
machines (VMs). After loading the command extension, by using Import-Module Hyper-V, you have more than 200 new commands at your disposal (depending on the version) for managing your hypervisor and VMs. You
18%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
Fedora 22 system, generate a custom Atomic software repository, and fill it with the desired packages. Docker hosts can then use this custom repository. Atomic with a Package Manager At this point, some
18%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
be parallelized). For one process, the wall clock time is assumed to be 1,000 seconds, which means that 200 seconds of the wall clock time is the serial portion of the application. From Amdahl’s Law, the minimum
18%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
Every year, cybercrime causes damage estimated at $450 billion [1]. Average costs have risen by around 200 percent per incident over the past five years, with no end in sight. The Herjavec Group
18%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
168 (gdb) p j $3 = 144 (gdb) c Breakpoint 2, Calc_vacf () at MD.o.c:671 671 vacf[j-i]=0; (gdb) p &j $6 = (int *) 0xffffc168 (gdb) p j $7 = 144 On the other hand, when dealing with the ELF

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice