Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 146 147 148 149 150 151 152 153 154 155 156 157 158 159 ... 208 Next »

12%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
HTTPD provides the Timeout directive to deal with user-induced denial-of-service problems like this and allows monitoring of the web server's I/O channels, such as the TCP connection to the browser
12%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
to the manufacturer, a grommunio instance can be integrated easily into an existing Windows Active Directory (AD) domain. Linux provides the operating system (openSUSE, Ubuntu, Red Hat, Raspberry Pi OS), which makes
12%
HPCCM with Docker and Podman
09.09.2024
Home »  HPC  »  Articles  » 
that the image is only 149MB, which is pretty small compared with the multigigbyte installations on desktops and laptops. To confirm that the container image works and that Vi is present, create an interactive
12%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
.net/~ubuntu-virt/virt-goodies/trunk/download/head:/vmware2libvirt $ python vmware2libvirt -f Metasploitable.vmx > Metasploitable.xml The Ubuntu script worked without any problems on a laptop running openSUSE Tumbleweed in our lab. The command zypper
12%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
Cloud computing provides computing resources and storage that can be accessed by any system connected to the Internet. Generally, this is in the form of virtual machines (VMs) and storage both
12%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
, this is the original and definitive source for all zone records for a domain. Secondary Name Server . Often called a slave server, this server is an identical replica used to provide redundancy and high availability
12%
High-Performance Python 3
19.09.2019
Home »  HPC  »  Articles  » 
 Nvidia GTC 2017 (Listing 1) that is a version of the addition function shown in the previous section. In this version, you control the looping with CUDA variables provided by Numba when you use the
12%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
, whose well-constructed ReadMe file provides the following description: “Gauntlt is a ruggedization framework that enables security testing that is usable by devs, ops, and security.” The learning curve
12%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
benefit in both the long and the short term. One of the most satisfying of these security tools is Gauntlt [1], whose well-constructed ReadMe file [2] provides the following description: "Gauntlt
12%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
. The KNIME Explorer in the top-left corner of the workspace provides an overview of the workflows. Click the View menu and select Workflow Coach to access the Workflow Coach, which offers suggestions

« Previous 1 ... 146 147 148 149 150 151 152 153 154 155 156 157 158 159 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice