Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12!490 Llorente"500 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (263)
  • Article (82)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 36 Next »

18%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
and anomalies and offers alerting functions. The Security Onion web interface uses standardized tools to display content, primarily relying on Kibana [12] and Grafana [13]. Kibana displays the incoming data
18%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
6), and start stream blocking (line 7), which executes the command and waits for the response. Now, write the output to a variable (lines 9-12), close the stream (line 14), and send the response
18%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
.5 to 1 bitcoins (about EUR200-400/$217-434) to the cybercriminals. In return, the victim receives the private key for decrypting the files. This blackmail trojan is currently spreading rapidly throughout
18%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
see that the base module is by far the largest, weighing in at more than 200KB. When a module is loaded, it is copied to /etc/selinux/targeted/modules/active/modules/. When the system is rebooted
18%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
. These requirements are machine architecture independent.” Such performance greatly exceeds the capability of machines available today; the world’s fastest supercomputer (according to www.top500.org/ ) currently clocks
18%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
18 months. And, among those reporting incidents, 18 percent put their losses at more than US$ 500,000 while another 8 percent saw losses in excess of US$1 million. Of the respondents who experienced
18%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
public_key = "${file("${var.ssh_pub_key}")}" 07 } 08 resource "digitalocean_droplet" "mywebapp" { 09 image = "docker-16-04" 10 name: guest 11 region = "fra1" 12 size = "512mb" 13 ssh
18%
What's New at OpenMP
30.01.2013
Home »  HPC  »  Articles  » 
to the project, promises “significant enhancements to parallelism.” We checked in with Wong and van Waveren at the recent SC12 supercomputing conference in Salt Lake City, Utah, USA, for an update on the new Open
18%
Moore's Law Continues its Unwavering March
09.10.2013
Home »  HPC  »  Articles  » 
is effectively designed like a supercomputer, with a host-side, dual-core Zynq-7010 ARM A9 CPU running Ubuntu 12.04, flanked by a 16-core Epiphany accelerator running at 700MHz. Priced at US$ 99, as opposed
18%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
, a high-quality password, some form of two-factor authentication, or both will make it more difficult for the attacker to succeed. See Guido Vranken's blog [https://guidovranken.wordpress.com/2015/12

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 36 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice