Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 204 205 206 207 208 209 210 211 212 213 Next »

17%
System logging for data-based answers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Gerard Boissinot, Fotolia.com
(remote syslog) [3], an open source tool for forwarding log messages to a central server using an IP network. It is very configurable using the /etc/rsyslog.conf file and the files in the /etc
17%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
are becoming increasingly clear. One of the main problems is a lack of generalization capability when processing data that did not appear in the training set. From the errors that such networks make [3] and from
17%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
.217.16.206: icmp_seq=3 ttl=54 time=24.450 ms 64 Bytes from 172.217.16.206: icmp_seq=4 ttl=54 time=23.802 ms 64 Bytes from 172.217.16.206: icmp_seq=5 ttl=54 time=29.555 ms 64 Bytes from 172.217.16.206: icmp_seq=6 ttl
17%
Linux I/O Schedulers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © pandavector, 123RF.com
from a NOOP I/O scheduler. Anticipatory The anticipatory I/O scheduler [3] was the default scheduler a long time ago (in kernel years). As the name implies, it anticipates subsequent block requests
17%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
are not defenseless: The Enhanced Mitigation Experience Toolkit (EMET) has had a function similar to pinning since version 4.0 [3]. Until recently, the server was basically defenseless against these attacks. All data
17%
Interview with the developer of Singularity
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wu ruiyun, 123RF.com
a repository of containers to which people can upload their work for others to download pre-made SAPPs; (3) to get Singularity included in the various distributions. To achieve all three goals, I need help
17%
High availability with SQL Server 2012 and 2014
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © li xuejun, 123RF.com
Assurance [3]. You can also try out SQL Server 2014 directly on Azure. To do so, when you access the trial version, select "Preview SQL Server 2014 CTP1 on Azure." SQL Server 2014 integrates seamlessly
17%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
designed to find dense vector similarities efficiently. Vespa [3] is a fully featured search engine and vector database that supports approximate nearest neighbor (ANN) vector searches, lexical searches
17%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
monitoring products based on Nagios and that use either NSClient++ or their own agents, such as Checkmk [3], have this function, which makes it possible to inject arbitrary script code through the monitoring
17%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
it is talking to C:\Windows. Annoyingly, Windows allows users (and therefore also attackers) to create a new directory directly below C:, which must be prevented at the NTFS level [3]. In addition to path rules

« Previous 1 ... 204 205 206 207 208 209 210 211 212 213 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice