Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (378)
  • Article (112)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 50 Next »

10%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
be no question of disabling the legacy algorithm for the time being. However, disabling MD5 signatures is something that you can (and should) do today. You can enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2
10%
Gatling load-testing tool
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by NoWah Bartscher on Unsplash
class BlazeDemoV1 extends Simulation { 08 09 var qualifiedhost = "http://blazedemo.com" 10 var proxyport = 0 11 var proxyhost = "not set" 12 13 // headers for HTTP call 14 val headers = Map( 15
10%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
.69 17.26 67.7 IS (4 cores) 0.6 2.16 8.2 LU (6 cores) 5.13 41.8   MG (4 cores) 1.2 3.8 39.1 SP (4 cores
10%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
.05 FT (4 cores) 1.69 17.26 67.7 IS (4 cores) 0.6 2.16 8.2 LU (6 cores) 5.13 41.8 MG (4 cores) 1.2 3.8 39
10%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
10%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
0 22 243056 23 12 24 1 25 26 27 16 28 29
10%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
Query team is now focused on further developing jQuery 3. However, the old versions 1.12 and 2.2 still receive bug fixes, so developers can address the migration in peace. Infos jQuery: https
10%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
int idparticle; 05 double pos[D]; 06 double vel[D]; 07 double force0[D]; 08 double force[D]; 09 double mass; 10 char bf[BFSIZE]; 11 void *nxtParticle; 12 }; 13 PARTICLE
10%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
.170 17.75 Xenial (16.04) ami-0133407e358cc1af0 9.300 7.001 16.301 Bionic (18.04) ami-0186d369d234b536f 12.946 5.608 18.554 Focal
10%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
_schema.events_statements_summary_global_by_event_name WHERE event_name LIKE "%/savepoint"; +------------+ | COUNT_STAR | +------------+ | 1 | +------------+ 1 row in set (0.00 sec) Hands On The following sections demonstrate the installation

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice