Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1191)
  • News (403)
  • Article (299)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 182 183 184 185 186 187 188 189 190 Next »

18%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
 for future use. Before I dive in too quickly, though, I’ll look at an issue that needs a little forethought and then the workflow of what the Automation document will look like. If you’ve already opened
18%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
and choice in this vital area. I focus on the open source Cilium network plugin, which is one of a few CNI choices that leverages eBPF (the successor to the Berkeley Packet Filter) to provide high performance
18%
Have a Bash with the Zing network utility
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Micah Tindell on Unsplash
in a variety of programming languages, is open source, and is available for download [3]. Yet the idea occurred to me to implement zing as a Bash shell script, which has the advantage of avoiding recompilation
18%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
by an authorized user opens up the system to malicious code and subsequent compromise. The fact of the matter is that system attacks are widespread, unrelenting, and often automated, indiscriminately looking
18%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
exciting open source database comes out next.
18%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
layer of security for Linux-based web applications. The WAF protects against common web vulnerabilities such as SQL injection, cross-site scripting (XSS), and other Open Web Application Security Project
18%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
applications from Asterisk to OpenERP, Drupal or Mediawiki, Zarafa, vTiger, Moodle, and so on. All told, we counted 15 in-house applications and more than 20 from third parties. In enterprise use, the Disk
18%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
for Local file system 23 - elastichosts plugin for ElasticHosts 24 - openstack plugin for OpenStack 25 - libvirt plugin for libvirt Virtualisation API The Appliance Definition File Before you
18%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
Fortunately for Linux types, an open source project, smartmontools, allows you to interact with the S.M.A.R.T. data in drives on your systems. Using this tool, you can query the drives to gather information
18%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
supercomputers: Commodity processors and networking Open source software Linux Beowulf clusters This article focuses on a bit of the history of supercomputer processors and PC processors

« Previous 1 ... 182 183 184 185 186 187 188 189 190 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice