Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (72)
  • Article (18)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

20%
Best practices for KVM on NUMA servers
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Joe Belanger, 123RF.com
Viewing Server Topology 01 # numactl --hardware available: 8 nodes (0-7) node 0 cpus: 0 1 2 3 4 5 6 7 8 9 node 0 size: 16373 MB node 0 free: 15837 MB node 1 cpus: 10 11 12 13 14 15 16 17 18 19 node 1
20%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
public_key = "${file("${var.ssh_pub_key}")}" 07 } 08 resource "digitalocean_droplet" "mywebapp" { 09 image = "docker-16-04" 10 name: guest 11 region = "fra1" 12 size = "512mb" 13 ssh
20%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
. Depending on the functional scope, the prices are between US$ 1,000 and US$ 5,000 including 12 months of free upgrades, news, and information. For newcomers to the world of server virtualization, Citrix
19%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-256-cbc; 07 } 08 policy pfs2-aes256-sha1 { 09 perfect-forward-secrecy { 10 keys group2; 11 } 12 proposals aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind
19%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
) 8 (4) 7.2 0.9 Nehalem-EP (2009) 8 (4) 32 4 Westmere-EP (2010) 12 (6) 42 3.5 Westmere-EP (2010) 8 (4) 42
19%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
/share/doc/stunnel*/. The example in Listing 1 shows a very simple configuration that uses stunnel as a plain vanilla TLS client. Listing 1 Stunnel as a TLS Client ; global settings sslVersion = TLSv1.2 chroot = /var
19%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
. Clients don't actually know whether they really see all the messages that arrive at the broker; the broker ACLS decide this. Messages transport payloads; payload data can also be binary and be up to 256MB
19%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
family, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So
19%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
_DATA=$1 06 07 # This is the Event Data 08 echo $EVENT_DATA 09 10 # Example of command usage 11 EVENT_JSON=$(echo $EVENT_DATA | jq .) 12 13 # Example of AWS command that's output will show up
19%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
} 07 define service{ 08 use generic-service 09 host_name w2k12srv 10 service_description Uptime 11 check_command check_nt!UPTIME 12 } 13 define service

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice