Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (99)
  • Article (18)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

14%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
); i+= 4096) newblock[i] = 'Y'; 12 printf("Allocated %d MB\n", allocation); 13 } 14 } Things are more interesting when memory is being used. Uncommenting line 11 does just that. The OOM
14%
Best practices for KVM on NUMA servers
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Joe Belanger, 123RF.com
Viewing Server Topology 01 # numactl --hardware available: 8 nodes (0-7) node 0 cpus: 0 1 2 3 4 5 6 7 8 9 node 0 size: 16373 MB node 0 free: 15837 MB node 1 cpus: 10 11 12 13 14 15 16 17 18 19 node 1
14%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
public_key = "${file("${var.ssh_pub_key}")}" 07 } 08 resource "digitalocean_droplet" "mywebapp" { 09 image = "docker-16-04" 10 name: guest 11 region = "fra1" 12 size = "512mb" 13 ssh
14%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-256-cbc; 07 } 08 policy pfs2-aes256-sha1 { 09 perfect-forward-secrecy { 10 keys group2; 11 } 12 proposals aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind
14%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
= debug 06 identity = rawhide.tuxgeek.de 07 08 # connector plugin config 09 connector = stomp 10 plugin.stomp.host = activemq.tuxgeek.de 11 plugin.stomp.port = 6163 12 plugin.stomp.user = unset 13 plugin
14%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
_DATA=$1 06 07 # This is the Event Data 08 echo $EVENT_DATA 09 10 # Example of command usage 11 EVENT_JSON=$(echo $EVENT_DATA | jq .) 12 13 # Example of AWS command that's output will show up
14%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
. The problematic compression is disabled. Listing 1 Configuration Example SSLProtocol -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2 SSLHonorCipherOrder on SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:DHE
14%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
) 8 (4) 7.2 0.9 Nehalem-EP (2009) 8 (4) 32 4 Westmere-EP (2010) 12 (6) 42 3.5 Westmere-EP (2010) 8 (4) 42
14%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
/share/doc/stunnel*/. The example in Listing 1 shows a very simple configuration that uses stunnel as a plain vanilla TLS client. Listing 1 Stunnel as a TLS Client ; global settings sslVersion = TLSv1.2 chroot = /var
14%
Program GUIs in Go with Fyne
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Santoshi Guruju on Unsplash
import ( 04 "crypto/md5" 05 "crypto/sha1" 06 "crypto/sha256" 07 "crypto/sha512" 08 "encoding/hex" 09 "hash" 10 "io" 11 "log" 12 "os" 13 ) 14 15 func genChecksum(file, hashfunc string

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice