Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (486)
  • Article (157)
  • Blog post (5)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 66 Next »

15%
Layer 3 SDN
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kirsty Pargeter, 123RF.com
; they implement the division in Layer 2. SDN is therefore basically making up for a part of the virtualization that was missing until the emergence of the first conceptual networks. RAM and CPUs had long been
15%
Manage projects in SMEs with OpenProject
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pedro Miranda on Unsplash
. Installing the Community edition of the Docker environment is described online [2], so I will not go into this aspect of the setup in detail. Getting Started Once a system with a working Docker environment
15%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
Advanced Threat Protection (ATP) portal [2], which is the place to go for in-depth information on potential attacks and to pick up scripts or code snippets that simulate attacks, and determine the effects
15%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
an array such as x(100,100) , then you cannot change the dimensions or size after the code has been compiled. One trick some applications used was to define one very large vector and then “give” parts
15%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
care of hosts rather than specific applications, the Cloudify developers leverage the power of Chef as a central management tool. Since Cloudify 2.2, it has been possible to use Chef to deploy
15%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
Lua is a small, lean, and fast scripting language – ideal for working with web servers. Version 2.4 of the Apache web server is the first to offer a matching module that has a few quirks ... . The syntax uses a minimum of keywords, which – on the downside – makes Lua programs more cryptic than their PHP counterparts. Damp Squib Thanks to all these properties, Lua would seem to be an obvious choice ... Lua is a small, lean, and fast scripting language – ideal for working with web servers. Version 2.4 of the Apache web server is the first to offer a matching module that has a few quirks
15%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
of hosts rather than specific applications, the Cloudify developers leverage the power of Chef as a central management tool. Since Cloudify 2.2, it has been possible to use Chef to deploy applications
15%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
, Compliance , and Patch items, along with some general information about the system (Figure 2). Figure 2: Once a system has been registered, Insights publishes
15%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
or a directory). At a high level, the combination of the blocks, the management of the blocks, and the inode constitutes a filesystem. I won’t go into any more depth on filesystems because they vary so much
15%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
Modern Protections A lot of effort has been put into mitigating most of the known exploitation techniques that take advantage of memory corruption issues. More often than not, techniques employed

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice