Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (368)
  • Article (72)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 49 Next »

24%
Microsoft Announces "BlueHat" Prize for Better Security Solutions
05.08.2011
Home »  News  » 
 
technology designed to prevent the exploitation of memory safety vulnerabilities.The deadline for entries is April 1st 2012. More information can be found on the web page http://www.microsoft.com/security/bluehatprize.
24%
Dealing with VHDX files
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Alina Pavlova, 123RF.com
files can be destroyed very quickly when the host system encounters problems – but not so with VHDX files. If you use Windows Server 2012, you normally create VHD files as an iSCSI target; Windows Server
24%
Where Does Job Output Go?
11.09.2023
Home »  HPC  »  Articles  » 
performance and cost per gigabyte. Go right along the x-axis for increased capacity. Storage Tiering with Local Node Storage When HPC clusters first became popular, each node used a single disk to hold
24%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
along the x-axis for increased capacity. Storage Tiering with Local Node Storage When HPC clusters first became popular, each node used a single disk to hold the operating system (OS) that was just
24%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
18 19 Modules pm_buffer 20 MaxSize 102400 # 100 MByte buffer on the hard disk 21 Type disk 22 23 24 25 Modules om_udp 26 Host GraylogServerName 27 Port
24%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
Michelsons has worked since 2008 as a consultant for the NETHINKS Professional Services Team. The company, which celebrates its 15th anniversary this year, today has a staff of more than 20 at its main
24%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
  (  0.05%)  (  0.05% cumulative)    [   1-   2 days]:      0  (  0.00%)  (  0.05% cumulative)    [   2-   4 days]:   4675  (  1.20%)  (  1.25% cumulative)    [   4-   7 days]:    215  (  0.06%)  (  1.31% cumulative)    [   7
24%
Wireshark
27.11.2011
Home »  Articles  » 
 
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
24%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
After installing WSL for container operation, you should always check for and install any Windows updates to be on the safe side. To use the new WSL2 version, the WSL2 Linux kernel update package for x64
24%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
virtualized guest systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 49 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice