Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 04090 Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (252)
  • Article (111)
  • News (16)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 39 Next »

27%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
of the virtual computer models; their hardware configurations follow on the right. For example, the computer named m1.small only has one CPU and 256MB of RAM. The free/max column is also interesting: The number
27%
(Re)Installing Python
17.07.2023
Home »  HPC  »  Articles  » 
made a list of all packages I needed (Table 1). This list, although long, is not everything I wanted to install over time, but it captures more than 90%. These packages will serve as my base Python
27%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
this type of long-term attacker, you need a different, more methodical approach. Dwell Time Most organizations are already at the 80% threshold in regard to security. Getting to 90% and above
27%
Migrating to Azure Monitor Agent
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
immediately as soon as you send it to Log Analytics) and retention period, which is billed by time and volume of data. Only the first 30 days are free of charge, or 90 days if Microsoft Sentinel is enabled
27%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
to form a page (e.g., 8KB). Several pages then form a block (~2MB). At this level, the first peculiarity of flash memory already comes to light: Whereas new data can be written to unused pages, subsequent
27%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
. Clients don't actually know whether they really see all the messages that arrive at the broker; the broker ACLS decide this. Messages transport payloads; payload data can also be binary and be up to 256MB
27%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
community needs more closely and to integrate patches more quickly. The first stable version, 1.0, was released in December 2009, and the version counter has risen every couple of months ever since. Icinga
27%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
longer, but certainly you won't be too put out by server specifications at first. However, you might want to up the RAM and CPU specs for CI integration. Sadly, sometimes 512MB of RAM even on Linux boxes
27%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
percent of requests >76 percent of files are opened by just one client Only 5 percent of files are opened by multiple clients, and 90 percent of those are read just once The big Vegas finish
27%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
servers have long been a worthwhile target for attacks, such as the Li0n worm, which exploited a vulnerability in BIND. Moreover, DNS servers of all kinds are often used as amplifiers in distributed denial

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice