Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (249)
  • Article (130)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 39 Next »

28%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
size. Ideally, limited read performance impact is experienced by applications as drives map 512-byte legacy requests on aligned 4KB reads internally [3]. However, that is no longer the case when I
28%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
translates into a huge address that it is undoubtedly out of the process address space. The following line computes this address using the GNU Project debugger (gdb): (gdb) printf "0x%x\n",(j-i)+&vacf 0xd
28%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. In this case, the sensor sends messages by the User Datagram Protocol (UDP) to the remote server. For an initial impression of Maltrail, the developers offer an online demo [3]. Maltrail is not particularly
28%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
reports – with the help of web technologies such as HTML, JavaScript, jQuery [3], and CSS3, which Python creates in combination with R and the MongoDB [4] database. Comet Rising Figure 1 shows how
28%
Integrating FreeNAS with Windows Active Directory
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Parisod@Snowmelody, Fotolia.com
. Generally, you will be fine using the default option (non-advanced mode), but quite a few options are customizable by clicking the Advanced Mode button [3]. Once you have set up your FreeNAS box to use AD
28%
New features in PHP 8
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Maxim Borovkov, 123RF.com
the appropriate variables, which are then assigned values by a constructor (Listing 3, lines 2-12). In PHP 8, this can be written in a concise way (Listing 3, lines 15-21). Listing 3 Encapsulating Data
28%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
of this type could look like. Listing 3 Generating Certificates $ ssh-keygen -s ca_root_key -h -n server.example.com,172.16.155.130 -I server.example.com -V +180d server.example.com $ ssh
28%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
of this category currently on the free and open source software market. On the commercial side, Amazon's S3 probably works very similarly. Binary Objects Object stores rely on binary objects because they can
28%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
is the focus of this article. All these choices use VxLAN for internode communication. VxLAN is a reliable choice because its only requirement of the underlay network is that Layer 3 (L3) connectivity must exist
28%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
inspirational is by Jay Jacobs and Bob Rudis [3] [4]. These few months later, my R skill level has improved just enough to share some insight with you. Imagine me as somewhere between total noob R script kiddie

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice