Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (578)
  • Article (161)
  • Blog post (5)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 75 Next »

15%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
and the Class B "size" standard test (a four times size increase going from one class to the next) was used on a laptop with 8GB of memory using two cores (OMP_NUM_THREADS=2). Initial tests showed
15%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
is a freelance IT consultant and has been working in IT for more than 20 years. In addition, he writes hands-on books and papers on Windows and other Microsoft topics. Online you can meet him on http://thomasjoos.spaces.live.com.
15%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
postulated generic requirements. However, the zero trust architecture [1] from the US National Institute of Standards and Technology (NIST) and a position paper from Germany's BSI [2] (for which the institute
15%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
of sniffing, the Envoy developers cite Amazon's DynamoDB, which can be monitored by Envoy. Between Worlds Envoy supports HTTP/2, which has been on the market since 2015, although its predecessor is still
15%
File Compression for HPC
10.11.2021
Home »  HPC  »  Articles  » 
is “overwritten”; that is, the original file is replaced with the compressed file and no longer exists. Notice that the utility uses the extension *.bz2 , so you know it has been compressed with bzip2 . Even
15%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
DestinationSizeChange 41943106 (40.0 MB) Another view of the file statistics lists which file effected the change: # gunzip -c /mnt/backup/rdiff-backup-data/file_statistics.\ 2015-03-15T10\:44\:06+01\:00.data.gz | awk '$2
15%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
in Europe than in the US, and not because no bright minds with smart ideas are on the east side of the Atlantic, but because of the structures of the industry as such. The much-quoted bon mot "we've always
15%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
a DHCP server, a VPN or Remote Desktop gateway, or a 802.1X-capable switch (Figure 2). The enforcement point forwards the identified integrity status to the Network Policy Server (NPS), which then uses ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they ... NAP with 802.1X ... Port-based access protection with NAP and 802.1X
15%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
, because Teleport comes with its own discovery protocol (Figure 2). Under the hood, it is far more complex than you might expect. Figure 2: Teleport comes
15%
Migrating CentOS to Rocky Linux with migrate2rocky
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Ray Hennessy on Unsplash
corresponds to RHEL 8 (with 4.x kernels), of which multiple minor versions have been released since. Rocky Linux 8.4 appeared over a month after RHEL 8.4, whereas 8.5 and 8.6 were released less than a week ... CentOS users need to find a replacement soon. If you use CentOS 8 and you're looking for safer ground, the migrate2rocky script will automatically migrate your system to Rocky Linux – an enterprise ... migrate2rocky ... Migrating CentOS to Rocky Linux with migrate2rocky

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice