Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 182 183 184 185 186 187 188 189 190 191 192 193 194 195 ... 199 Next »

8%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
over a year ago. Alternatively, you can use the implementation in Rust, named Rage [2]. The Go version is well ahead in terms of performance, though, especially with large volumes of data. Age has
8%
News for Admins
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
 
.11 enhances performance for Zen 2/Zen 3 CPUs and adds support for Van Gogh. Finally, Nvidia RTX 30 GPU support has been added. One of the more exciting additions to the kernel is the inclusion of the Syscall
8%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
in Figure 1, the following four chains are created in the filter table: DOCKER, DOCKER-USER, DOCKER-ISOLATION-STAGE1, and DOCKER-ISOLATION-STAGE2. With the exception of the DOCKER-USER chain, you should
8%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
in which applications run. These containers are lean because they share the same kernel but are executed in separate run-time environments, thanks to cgroups [2] and namespaces [3], which define which
8%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
by the vulnerabilities. The Docker Bench for Security [2] tool takes a somewhat different approach; it is actually just a shell script that checks the existing containers based on the recommendations of the Center
8%
Data Security vs. Data Protection
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Andrea Danti, 123RF.com
. Although the company has presumably agreed to use the data for the protection of its IT infrastructure, this agreement does not release it from the obligations of data economy and earmarking. Article 9 [2
8%
A full virtualizer and an alternative to containers
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Antonio Gabola on Unsplash
Lambda service [2], where it enables basic virtualization of small VMs. However, Firecracker can do far more and looks set to conquer territory, even some that is currently occupied by containers
8%
Moving Data Between Virtual Machines
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © alphaspirit, 123RF.com
virtual switches only work in Layer 2. This means that in routing between virtual machines, the traffic is forwarded to the default gateway between the VLANs. Overlay Traffic In a networked, virtual
8%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
their geometry, in effect using disk attributes as an abstraction to interface with the operating system rather than a real description of disk structure, as I discussed in a previous article [2]. This has
8%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
of laptops have been discovered to be vulnerable to attack. The security research group Eclypsium has discovered (https://eclypsium.com/2020/2/18/unsigned-peripheral-firmware/) that hardware made by Dell, HP

« Previous 1 ... 182 183 184 185 186 187 188 189 190 191 192 193 194 195 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice