Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12!600 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (473)
  • Article (113)
  • News (8)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 60 Next »

17%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
to an appropriate value (600 minutes is the AD default; 240 minutes is the default for Protected Users). In the Computer section, create the Access Control Conditions User – Authentication Silo – equals
17%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
computers or the layout of the OSDs. Whether the work in Ceph is handled by three servers with 12 hard drives or 10 servers with completely different disks of different sizes is not important
17%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
.0 2.2.x. 2.6.30 through 2.6.35 Debian 6 (Squeeze) 2.3.x. 2.6.36 through 3.0 Ubuntu 11.10 2.4.x. 3.1. openSUSE 12.1 2.5.x. 3
17%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
the code states should be good enough for caches up to 20MB. The Stream FAQ recommends you use a problem size such that each array is four times the sum of the caches (L1, L2, and L3). You can either change
17%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
can save some partitions or devices for later when the requests for more space arrive. You can also create PVs and just leave them for later. Listing 1 is an example from an Ubuntu 22.04 system
17%
News for Admins
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
-based systems, including Linux, macOS, and BSD. According to the announcement (https://www.winehq.org/announce/8.0), this release represents a year of development effort and more than 8,600 individual changes
17%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
"SubnetMax": "10.99.0.0", 07 "Backend": { 08 "Type": "udp", 09 "Port": 7890 10 } 11 } 12 [...] At first glance, this concept looks robust and simple
17%
News for Admins
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
 
in the broadening of MLflow adoption. Currently, MFflow is downloaded over 2 million times per month and enjoys over 200 contributors. Original announcement: https://www.linuxfoundation.org/press-release/2020
17%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
in TLSv1.0 was error-prone, but the problems long remained theoretical. TLSv1.1, which was designed to iron out the worst weaknesses of CBC, followed in 2006. Two years later, TLSv1.2 was released
17%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
CREATED SIZE nginx f09fe80eb0e7 12 days ago 109MB nginx latest 35640fed495c 12 days ago 109MB Backdoor Access Considering how well Docker Scan handled

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice