Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 216 Next »

42%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
that I like funny videos on YouTube and really old and really bad science fiction movies, or that my musical tastes run all over the map, or that I do all sorts of technical writing and have some definite
42%
Chive
17.04.2012
Home »  Articles  » 
 
in January 2012. A newer version 1.0.3 was released March 18, 2012. To get started, just unpack the archive and copy the Chive folder into the document root of your web server. If you run a recent Debian
42%
TCP Fast Open
05.03.2013
Home »  Articles  » 
 
With TCP Fast Open, Google introduces a protocol extension, implemented in the Linux kernel, that avoids unnecessary latency in network traffic and promises up to 41 percent acceleration, depending ... In mid-2011, Google’s “Make the web faster” team, which is led by Sivasankar Radhakrishnan, Arvind Jain, Yuchung Cheng, and Jerry Chu, presented a draft for reducing preventable latency ... With TCP Fast Open, Google introduces a protocol extension implemented in the Linux kernel that avoids unnecessary latency in network traffic and promises up to 41 percent acceleration, depending
42%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
between the switch and the number of threads. A downside to xz  is that the decompression command, unxz , is not multithreaded. You can still decompress .xz  files with unxz , but it is run serially rather
42%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
logical volumes (LVs). To create a logical volume, you use the lvcreate  command, but before running the command, you need to plan your LV. For example, how will the LV be used? How many VGs will be used
42%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
a class, the available attributes are displayed (Figure 2). What's more, if you find an interesting attribute, a script can be run on the local computer at the push of a button to display the value
42%
Version 5.2 of the Ruby framework
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Author, 123RF.com
dad34a3168?68d634f foobar: test Listing 2 Retrieving Credentials $ rails console Running via Spring preloader in process 19662 Loading production environment (Rails 5.2.0) >> Shop
42%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
by attempting to retry requests to improve the connection's resilience. To prevent this type of attack, all servers running an application must share state to guarantee that it accepts this particular set of 0
42%
News for Admins
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
 
://ir.vmware.com/overview/press-releases/press-release-details/2018/AWS-and-VMware-Announce-Amazon-Relational-Database-Service-on-VMware/default.aspx The move by AWS is a clear indication of the growing demand for hybrid cloud where customers want to run workloads
42%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
. It can result in leakage of secret data in applications such as OpenSSL that has secret dependent control flow at any granularity level. In order to exploit this flaw, the attacker needs to run a malicious

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice