Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (313)
  • Article (93)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 42 Next »

18%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
application then grabs the data from this database and creates charts. The client can be programmed by the user or it can come as a prepared daemon (e.g., collectd [3]). If you like to measure your own
18%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
="filtered" reason="no-response" reason_ttl="0"/>
18%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
the origin of the name (and how to pronounce it). The Wikipedia [3] page does a great job of joining the dots with the link to wasps: "The Mutillidae are a family of more than 7,000 species of wasps whose
18%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
in the Ubuntu 11.x and Debian 6.x package sources. You can also opt for the host-based IDS OSSEC by Trend Micro [3]. If the Prelude Manager is running on a remote server, the rule-based Prelude Correlator
18%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
- reviewer4 - reviewer8 product3: - reviewer3 product4: - reviewer4 - reviewer7 product5: - reviewer5 - reviewer8 product6: - reviewer6 The human eye immediately
18%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
to a cyberattack. For example, the district of Anhalt-Bitterfeld (Germany) was unable to pay out social benefits to 157,000 citizens in 2021 after a cyberattack and had to stop most of its work for two and a half
18%
Monitor your network
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Endrille, Fotolia
it will automatically reboot the computer. If you wish to install Pandora FMS inside an existing server or inside a Docker container, you can refer to its online guide [3] that details the exact steps for each
18%
Get to know Azure Files and Azure File Sync
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © moovstock, 123RF.com
management is no exception, with object storage for virtually unlimited volumes of data on the rise in the form of services that offer compatibility with Amazon Simple Storage Service (S3) – or at least
18%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
source products, such as OpenStack [1], openQRM [2], Eucalyptus [3], or Ganeti [4], each with its specific functionality and concepts. Because of the diversity of scenarios, most cloud stacks behave
18%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
), has to be specified. Here is a simple example of the declaration:       INTEGER, TARGET :: a(3), b(6), c(9)       INTEGER, DIMENSION(:), POINTER :: pt2 Another quick example of multidimension arrays

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice