Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1346)
  • Article (336)
  • News (252)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 172 173 174 175 176 177 178 179 180 181 182 183 184 185 ... 194 Next »

9%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
's standards. TCP includes the SMTP protocol for email and HTTP/1.1 and /2.0; therefore, all TCP stack optimizations have a positive effect on performance. In this article, I take a look at the TCP initial
9%
Software-defined networking with Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Kirill Cherezov, 123RF.com
Shell. However, to work, support is required from the respective hardware manufacturer. The software components in Windows Server 2016, which work directly with the Network Controller, already support PowerShell 5.0
9%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
value drops to 9.0, but the rating remains unsafe. The next step is to add RestrictNamespaces=uts ipc pid user cgroup to the unit file, which prevents the process from accessing the listed namespaces
9%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
the penetration testing tool with a reference to the network nodes on which the vulnerability exists. For the sample data populated for new users, the web server on 10.0.155.160 is affected. The tabs for CVSS
9%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
/type-support-working-with-sudo-logs-in-syslog-ng-4-0 The Author Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product
9%
SSH on Windows
17.09.2013
Home »  Articles  » 
Windows SSH client PuTTY, developed by Simon Tatham, is also a free SSH implementation. It is subject to the MIT license and is currently at version 0.62 from 2011. All versions of SSH are largely
9%
MapReduce and Hadoop
27.02.2012
Home »  HPC  »  Articles  » 
(pseudocode): method Reduce(target,counts[c1,c2,...]) sum <- 0 for all c in counts[c1,c2,...] do sum <- sum + c end emit(target,sum) end If you take a look at the schematic, you quickly see
9%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
– in this example: virsh secret-set-value 2a5b08e4-3dca-4ff9-9a1d-40389758d081 AQA5jhZRwGPhBBAAa3t78yY/0+1QB5Z/9iFK2Q== Listing 4: ceph-secret.xml 01  02   2a5b08e4-3dca
9%
VMware Tools
15.10.2013
Home »  Articles  » 
be saved as a blueprint so that other users can produce additional instances of the application when needed. For the first time, the new version 5.0 of vFabric Director is no longer limited to Linux and now
9%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
.conf ) by editing /etc/powerdns/recursor.conf . For brevity’s sake, I only include the configuration variables I have changed herein. allow-from=192.168.1.0/24 #The 'allow-from' address specifies the network address

« Previous 1 ... 172 173 174 175 176 177 178 179 180 181 182 183 184 185 ... 194 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice