Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (285)
  • Article (40)
  • News (38)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 37 Next »

23%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
18 19 Modules pm_buffer 20 MaxSize 102400 # 100 MByte buffer on the hard disk 21 Type disk 22 23 24 25 Modules om_udp 26 Host GraylogServerName 27 Port
23%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
Michelsons has worked since 2008 as a consultant for the NETHINKS Professional Services Team. The company, which celebrates its 15th anniversary this year, today has a staff of more than 20 at its main
23%
Wireshark
27.11.2011
Home »  Articles  » 
 
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
23%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
After installing WSL for container operation, you should always check for and install any Windows updates to be on the safe side. To use the new WSL2 version, the WSL2 Linux kernel update package for x64
23%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
virtualized guest systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself
23%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself, which
23%
Last Call for the ISC Student Cluster Competition
08.10.2013
Home »  HPC  »  News  » 
 
November 1, 2013 is the deadline for entries in International Supercomputing Conference (ISC '14) Student Cluster Competition. ISC '14 will be held in Leipzig, Germany on June 22-26, 2014
23%
New TOP500 List Pushes the Limits
19.06.2013
Home »  HPC  »  News  » 
 
The June 2013 TOP500 supercomputer was unveiled at the International Supercomputing conference in Leipzig, Germany. As expected, the phenomenal new Chinese computer known as Tianhe-2 (or Milky Way-2
23%
Use of Leap Seconds to Be Discontinued
01.12.2022
Home »  News  » 
 
. However, discontinuing their use has been debated since at least 2013, “on grounds that they're more trouble than they're worth and represent risks to important communications and computing systems.” Read
23%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
Map 18 metadata: 19 name: mariadb 20 labels: 21 app: mariadb 22 data: 23 MYSQL_ROOT_PASSWORD: mysqlroot 24 MYSQL_DATABASE: db1 25 MYSQL_USER: mysqluser 26 MYSQL_PASSWORD: mysqlpwd

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice