Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 183 Next »

13%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
is based on the CSA Security Guidance document [3]. The CSA Security Guidance, in turn, is designed to provide high-level coverage of cloud security issues and some methods to address them, ranging from
13%
Operating system virtualization with OpenVZ
28.06.2011
Home »  CloudAge  »  Articles  » 
 
using Linux-Vserver [1], OpenVZ [2], or Virtuozzo [3]. Benefits Hypervisor-based virtualization solutions emulate a complete hardware layer for the guest system; ideally any operating system including
13%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
communication and I/O are best suited for clouds. Finding 3. Clouds require significant programming and system administration support. Finding 4. Significant gaps and challenges exist in current open
13%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
and performance of the user’s workload, I don’t see a problem using it. Example 3: Setting Temporary I/O Directories Very close to the previous example is one that creates temporary directories for the user
13%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
– or the entire network of a company – has been compromised, the cause of the attack and the underlying vulnerability must be identified. PowerShell is supported by the PowerForensics module [3], which helps
13%
News for Admins
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
 
personal details, but a bug in the software allowed all information to be displayed, including social security numbers. The bug was introduced when the website, managed by the EPA, was upgraded to version 3
13%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
variants: Meltdown-PK on Intel, and Meltdown-BR on Intel and AMD. The rest of the five flaws were related to Spectre. "We evaluate all 7 attacks in proof-of-concept implementations on 3 major processor
13%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
and Ethercalc Etherpad [2] and Ethercalc [3] are two separate, independently developed office applications for word processing and spreadsheet applications, respectively. As a unique selling point, the two
13%
Forensic analysis with Autopsy and Sleuth Kit
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Tomasz Pacyna, 123RF.com
the display. Indicators of compromise (IoCs), for example, can be modeled and exchanged in structured threat information expression (STIX) format [3]. Analysts create STIX documents according to the malware
13%
News for Admins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
 
for their mission-critical workloads." To make this even more appealing, Ubuntu Pro on Google Cloud will only be 3-4.5 percent of your average computing costs, so the more resources you consume, the smaller

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice