Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 185 186 187 188 189 190 191 192 193 194 195 196 197 198 ... 200 Next »

12%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
to build and run, and the output is easy to interpret. The NASA website [2] provides the following details on the NPB benchmarks. Five kernel benchmarks: IS – Sorts small integers using the bucket
12%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
to stop persistent attacks. Finally, Figure 6 provides a report of the types of web services available on the network. I have found reports such as the report in Figure 6 useful for identifying older web
12%
VTP for VLAN management
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluedarkat, 123RF.com
to forward messages to unnecessary ports. Finally, because hosts in different VLANs cannot communicate with each other directly, VLAN can also provide security. A host can be assigned to any VLAN regardless
12%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
a filesystem into the kernel?) and provide lots of flexibility. SSHFS [4] uses FUSE to create a filesystem that can be shared by transmitting the data via SSH. The SSHFS FUSE-based userspace client mounts
12%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
shells, but these tools provide excellent examples of what pen testers are able to do with a vulnerable system. Stay tuned for a future article, when I show how each of the steps discussed in this article
12%
Kibana Meets Kubernetes
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © wbraga, 123RF.com
version 3.0 onward, Helm had some relatively significant changes with the removal of Tiller because of security concerns [6], so be sure to choose version 3.0+. Hoots Mon The Helm Project itself provides
12%
Creating a private Docker registry
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Dayne Topkin on Unsplash
Docker registry. The process is relatively simple, but as with anything related to containers, it can be nuanced. The setup involves creating simple htaccess credentials to provide a degree of control over
12%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
to decrease with n . Some other attempts have been made to account for non-zero communication time in Amdahl's Law. One of the best is from Bob Brown at Duke [1]. He provides a good analogy of Amdahl's Law
12%
When I/O workloads don't perform
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Viacheslav Iakobchuk, 123RF.com
/O requests. The sysstat package provides a nice little utility called iostat that gathers both sets of data. In the example in Listing 6, iostat is showing an extended set of metrics and the CPU utilization
12%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
. Figure 2: The virsh command also provides information about the physical hardware of a remote node. Furthermore, the libvirtd daemon running on the host system likes to have root privileges

« Previous 1 ... 185 186 187 188 189 190 191 192 193 194 195 196 197 198 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice