Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3!600 Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (53)
  • Article (24)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 Next »

29%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
in which applications run. These containers are lean because they share the same kernel but are executed in separate run-time environments, thanks to cgroups [2] and namespaces [3], which define which
29%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
and right. Unfortunately, my laptop has a 16:9 display with a resolution of 1,600x900 pixels. Common Denominator Some research on the topic of screen resolution reveals the root cause: the maximum
29%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
take both a host-based and network-based approach. The suite uses three tools for host-based intrusion detection: (1) Wazuh [3] is a fork of the OSSEC [4] intrusion detection system; it monitors hosts
29%
Review: Accelerator card by OCZ for ESX server
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© gortan123, 123RF.com
on the iSCSI network, reaching a total of 500MBps. At 500MBps, the going would start to get tough, even for SATA 3.0 (and even older versions running at 150 and 300MBps would have long since given up
29%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
records are flushed. 3. The system halts. Hackers may hope to see results 1 and 2, because the resumption of broadcasts gives the intruder a chance to capture sensitive information. You can check
29%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
approx. US$ 600 approx. US$ 335 CPU Via Eden X2/1GHz Via Eden X2/1GHz AMD G-T44R/1.2GHz AMD G-T56N/1.6GHz Marvell ARMADA PXA 510 v7.1 Chipset
29%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
five years, and it affects devices with Qualcomm processors running Android 4.3 and older Android systems. Devices running newer versions of Android take advantage of Security-Enhanced Android (SE
29%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
(One-by-One) 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my_record; 14 int counter_limit; 15
29%
Small-board computers
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Author, 123RF.com
.5GHz Mali-450 MP2 @600MHz   1GB DDR3 GigE Ethernet, 4 USB 2.0, USB OTG, micro-HDMI, IR 10W $35/EUR44 http://www.hardkernel.com/ Parallella
29%
Parallelizing and memorizing Python programs with Joblib
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
s remaining: 3.5s [Parallel(n_jobs=2)]: Done 600 out of 1000 | elapsed: 3.4s remaining: 2.3s [Parallel(n_jobs=2)]: Done 801 out of 1000 | elapsed: 4.5s remaining: 1.1s [Parallel

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice