Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 133 Next »

33%
Video: Understanding Bulldozer Architecture Through the Linpack Benchmark
18.07.2012
Home »  HPC  »  Vendors  »  AMD  » 
 
With the Linpack benchmark, some key features of the new Bulldozer multicore processor, such as the shared floating point unit on the Bulldozer core, the fuse multiply add instructions (FMA4
33%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
We test two candidates for viewing and converting video DVDs and Blu-ray discs, HandBrake and MakeMKV, and point out legal hurdles.
33%
TokuDB v6.0 Released
12.04.2012
Home »  HPC  »  News  » 
 
DB also offers quick recovery after backup snapshots and up-to-date recovery points after a failure. In version 6.0, TokuDB’s compression performance is more aggressive, with compression levels up to 25x ... Tokutek releases TokuDB v6.0 for quick recovery after backup snapshots, up-to-date recovery points after a failure, and more.
30%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
the elements of the interface. The "attack surface" on which Microsoft documentation [1] focuses is the sum total of potential attack points on the computer systems of an IT network that unauthorized users could ... The sum total of all possible points of attack can be defined as the attack surface, and you need to take every opportunity to minimize it to the extent possible. Windows has built-in rules
30%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
the results in the filesystem. A few seconds later, we had the WinPcap 4.1.3 installation window on our screen; Nessus relies on the technical underpinnings of the free program library. From a practical point ... vulnerability scanner. We pointed the software at a number of test computers.
30%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
accumulated over the years and, perhaps more interestingly, why you have kept it. I think the same thing is true for data storage. At some point you're going to have to move the data from your existing storage ... The world is swimming in data, and the pool is getting deeper at an alarming rate. At some point, you will have to migrate data from one set of storage devices to another. Although it sounds easy
30%
Migration from LDAP to FreeIPA
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pier paolo gentili, 123RF
points need to be considered for the migration: How to migrate existing user and group objects. How to migrate user passwords. Which clients will be accessing the new identity management system ... The change from centralized user authentication on a vanilla LDAP server to the FreeIPA identity management solution is easier than many admins think. Given attention to a few points, the migration
30%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
27%
Editorial
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Officer for the Hacking Team, "… an extremely dangerous situation." Indeed it is. How did these hackers manage to hack the hackers of the Hacking Team? The initial entry point for the attack is unclear ... for the entire world. Almost 400GB of data, published in a single Torrent file, made its way onto the Internet for all to enjoy. The initial entry point for the attack is unclear, but one thing is certain
24%
Welcome
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Linda Bucklin, 123RF.com
that gave way to digital blips on a computer screen. The point is that all of the innovations I've seen during the past couple of decades have been made to make my life easier or richer in some obscure way

« Previous 1 2 3 4 5 6 7 8 9 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice