Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: ▶tippo365.com▶fortune gets how to win jon▶tippo365.com▶fortune gets how to win jackpotzi6 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 95 Next »

10%
Creating SmartOS zones using UCARP
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Le Moal Olivier, 123RF.com
to abandon the old ways of doing things. How to Achieve "Old-Fashioned" HA That said, inside a KVM virtual machine, you can do what you want: You obviously can install Linux, then you can install DRBD ... We show how to create highly available SmartOS zones using UCARP.
10%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
. Detection Algorithm The last of the previously mentioned criteria seems interesting from a programming point of view. How does an algorithm find groups of users who all rate the same products without having ... A Neo4j graph database example shows how to uncover fraudulent reviews on Amazon.
10%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
of command-line tools for EC2. S3 [6] (Simple Storage Service) offers permanent storage independent of EC2 virtual machines being deployed and shut down. Specifically, we use S3 to store the code that gets ... The Amazon cloud environment adapts easily to custom solutions. We'll show you how one company built their solution in the cloud.
10%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
     Microsoft Azure https://portal.azure.com      Azure AD admin center https://aad.portal.azure.com      Microsoft 365 admin center https://admin.microsoft.com ... Azure AD is one of the most important authentication services for cloud environments. We show you how to delegate authorizations in Azure AD to ensure better security.
10%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
DiskSizeGB: 47 10 } 11 source: { 12 type: 'PlatformImage' 13 offer: 'windows-ent-cpc' 14 publisher: 'MicrosoftWindowsDesktop' 15 sku: 'win11-22h2-ent-cpc-m365' 16 version
10%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
Some people consider container systems like Docker [1] a new form of virtualization – a natural continuation of KVM [2], Xen [3], VMware [4], Hyper-V [5], and the Zones concept in Solaris [6 ... DevOps and container technology often appear together. If you have one of them, you get the other automatically. However, as the following plea for reason shows, it isn't always that simple.
10%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
to hand over the /etc/passwd file for scrutiny. Check It Out A forward slash in the crafted URL is encoded by %2F , which should get you thinking about how a computer interprets user input. One ... Pitting the OWASP Zed Attack Proxy against an insecure web app in a Docker container illustrates how you can tick a lot of security checkboxes.
10%
Lmod 6.0: Exploring the Latest Edition of the Powerful Environment Module System
16.07.2015
Home »  HPC  »  Articles  » 
Lmod is an indispensable tool for high-performance computing. With the new release of version 6, now is a good time to review Lmod and look at its new capabilities. ... and has some unique features. I've written about Lmod before, but recently a new version 6.0 was announced that has some new tools that make it worth reviewing. Fundamentals of Environment Modules ... Lmod is an indispensable tool for high-performance computing. With the new release of version 6, now is a good time to review Lmod and look at its new capabilities. ... Lmod 6.0: Exploring the Latest Edition of the Powerful Environment Module System
10%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
-built plugin filter Metasploit Framework in your penetration testing. You will get a glimpse at how pen testers use Metasploit to probe and penetrate a real-world system. I will also cover some useful ... The powerful Metasploit framework helps you see your network as an intruder would see it. You might discover it is all too easy to get past your own defenses.
10%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
'm not sure where to get the code, but it seems to be part of some Linux distributions. A nice tutorial on the wiki [18] also explains how to use it. System Profiling At this point, you can glean some timing ... Computing hardware is constantly changing, with new CPUs and accelerators, and the integration of both. How do you know which processors are right for your code?

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice