Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brian calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (490)
  • Article (106)
  • News (71)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 67 Next »

14%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
monitors security-related activities of user accounts, such as those caused by hackers moving around the corporate network. The activities can include brute force login attempts, unusual changes to group
14%
Sustainable Kubernetes with Project Kepler
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Hassan Pasha on Unsplash
! Figure 3: The bare metal host's extra power consumption caused by the test workload is easily seen by the metrics from the ESPHome smart switch. The host is a 10-year-old Core i7 model with eight
14%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
is based on the MAC address and the physical topology of switches and routers and is limited to a certain number of devices and broadcast domains. This arrangement causes problems when it comes to scaling
14%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
that takes frequent breaks. Finding the Root Cause The application in the example here is quite conservative: the Apache web server, mod_cgi, some CGI programs in Perl, and the PostgreSQL database. Apache
14%
News for Admins
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Gernot Krautberger, Fotolia
of this information could reasonably be expected to cause serious damage to national security as it would allow hostile entities to discover the current intelligence gathering methods used, as well as the capabilities
14%
NetworkManager at the command line
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © godrick, 123RF.com
such as NetworkManager is the more complex boot process where many actions run in parallel thanks to the use of systemd. The old init scripts are not geared for this, which could cause problems in some setups
14%
Secure email communication
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Simon Moog on Unsplash
sending email on behalf of your own domain and causing damage. If you consistently use the techniques presented here, you can secure your mail server against this scenario, which means you also can
14%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
of attacks can be rendered impossible by adding PrivateTmp=yes to the unit file, which causes systemd to create a new, exclusive filesystem namespace for the process and to mount /tmp and /var/tmp/ there
14%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
= policy forces memory to be allocated from the list of provided nodes (including the all option): -----------text05 $ numactl --membind=0,1 application.exe This policy causes application.exe to use
14%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
. The looming end of conventional cryptography has caused mathematicians to search for a new kind of encryption that will resist quantum attacks. In order to succeed in the post-quantum world, a new generation

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice