Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (353)
  • Article (29)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 39 Next »

69%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
grows significantly. In both cases, attackers can access not only the services that the user regularly uses but also other systems on the network that the user does not normally access. These attacks
69%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
/object/what_is_cuda_new.html]  [3] Official OpenCL website: [http://www.khronos.org/registry/cl/]  [4] AMD/ATI system requirements, driver compatibility: [http://developer.amd.com
69%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
environments without a large IT team and without test equipment for what is normally a small number of computers. It is also helpful when it comes to taking an inventory of devices: A pull-down menu below
69%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
address space, for example. In some ways, mmap() replaces normal file operations such as read(). As Figure 3 shows, its implementation in Linux differs in one important detail: For read() and the like
69%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [3]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4
69%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
Altman (Y Combinator) [3], among others. The people of OpenAI contribute academic publications on the web, presentations at conferences, and software for researchers and developers. In this article, I
69%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
. One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established
69%
Improving performance with environment variables
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © sgame, fotolia.com
/en-us/geforce/graphics-cards/gtx-1650/ OpenBLAS: https://en.wikipedia.org/wiki/OpenBLAS cuBLAS: https://developer.nvidia.com/cublas BLAS Level 3 routines: https://docs.nvidia.com/cuda/nvblas/index.html CUDA: https://developer.nvidia.com
69%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
bulldozers digging up cables, Layer 2 or 3 software failures, or routers that fail one hop downstream on the provider's network. To avoid hard disk failures, administrators have relied on RAID for a long time
69%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
/ssh/sshd_config 23 24 # https://www.freedesktop.org/wiki/Software/systemd/ContainerInterface/ 25 STOPSIGNAL SIGRTMIN+3 26 27 CMD ["/bin/bash"] Next, create Dockerfile_UbuntuJJFMonit (Listing 2) and setup

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice