Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (541)
  • Article (183)
  • News (126)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 86 Next »

18%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS requests per second, a single DNS
18%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
/NIC teaming/bonding Yes Access Rights Management Max. number of users 60,000 Max. number of user groups 60,000 Max. number of network shares Unlimited
18%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
advanced technology attachment (SATA) hard disk interfaces (Figure 1). The reason for the performance leap is that NVMe is significantly faster than the traditional SAS storage protocol, supporting up to 64,000
18%
Green IT
24.10.2011
Home »  Articles  » 
 
. A sole proprietor would save more than EUR 4,000 over a period of nine years by upgrading; the researchers assumed that the business owner would need consultancy services and training when purchasing a new
18%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
of the desired distribution in RAW, TAR, or Docker format and then launch a container based on your choice of image. Listing 6 shows how to download a Fedora 22 image and launch a container based on it
18%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
, or Docker flavor and then start a container on the basis of that image. Listing 6 shows how to download a Fedora 22 image and start a new container based on it. Listing 6 Download and Start
18%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
the “Swiss army knife” of editors. It is extremely extensible and customizable, including the extensive use of macros. It has more than 2,000 commands built-in to the tool and includes a dialect of Lisp named
18%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
using a parallel shell tool. However, for those that might be asking if they can use parallel shells on their 50,000-node clusters, the answer is that you can, but the time skew in the results
18%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
. Although Gearman can be used as a separate service, the built-in service is sufficient for handling up to 10,000 tasks at once. If the built-in server is used, other Zuul hosts will need to be able
18%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
grants permissions to enable GuardDuty. If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 86 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice