Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub"22%2000 Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (259)
  • News (38)
  • Article (32)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next »

35%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
of compatible devices: https://technet.microsoft.com/en-us/cloud/dal.aspx Script management for compatible devices (examples): http://blogs.msdn.com/b/powershell/archive/2013/07/31/dal-in
35%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
NEW -m tcp --dport 22 -j ACCEPT 10 -A INPUT -p udp --dport 5353 -j DROP 11 -A INPUT -s -p tcp -m state --state NEW -m tcp --dport 443 -j ACCEPT 12 -A INPUT -m limit --limit 30/min -j
35%
Test JavaScript programs with Karma
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image Photo by Pierre Bamin on Unsplash
Ích. JavaScript Test Runner . Master's thesis, Czech Technical University in Prague, June 2013, https://github.com/karma-runner/karma/raw/master/thesis.pdf The Author Tim Sch
35%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
://blogs.technet.com/b/kevinholman/archive/2013/10/18/orchestrator-2012-r2-quickstart-deployment-guide.aspx Integration packages for System Center 2012 Orchestrator: https://technet.microsoft.com/en-us/library/hh295851.aspx System Center
35%
Open Network Operating System
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Rade Lukovic, Fotolia.com
in the GUI (Figure 4). Figure 3: The apps -s -a command shows an abbreviated ( -s ) list of active ( -a ) ONOS applications
35%
Managing Vim plugins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Thomas Reichhart, 123RF.com
directory at /usr/share/vim/addons, and a installation target at $HOME/.vim for private use or /var/lib/vim/addons for all system users. These directories can be changed using the options -r, -s, or -t
35%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
.21 –   EUR5.95 EUR1.00 (with French VAT) EUR2.78 (half price as of year two) – $2.92 License(s) AGPL, commercial GPL, LGPL, AGPL Commercial GPLv3
35%
Open source mail archiving software compared
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexander Dedrin, 123RF.com
Mail server Postfix, Exim, Sendmail, Qmail Yes Yes, all SMTP Microsoft Exchange 2003/2007/2010 5.5/2000/2003/2007/2010/2013 2003/2007/2010/2013
35%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
_modules Directory [laytonjb@home4 ~]$ ls -s /usr/lib64/ganglia/python_modules total 668 16 apache_status.py* 4 example.pyo 8 netstats.pyc 16 tcpconn.py 12 apache_status.pyc 16 memcached
35%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... Apache’s capacity. According to Gartner researchers, about a quarter of all DDoS attacks in 2013 will target the application layer. DDoS via HTTP The defense against ACK reflection and SYN flood attacks ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, which allows them to work around conventional defense mechanisms. We explain how a DDoS attack

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice