Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (50)
  • News (9)
  • Article (6)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

17%
Improved logging in Samba Winbind
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © monsit jangariyawong, 123RF.com
:20:51.998105, 3, pid=1153814, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:502(process_request_send) process_request_send: [nss_winbind (1153856)] Handling async request: GETPWNAM
17%
Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure
05.12.2024
Home »  News  » 
 
, such as Cisco Discovery Protocol (CDP) or Link Layer Discovery Protocol (LLDP). Disable Internet Protocol (IP) source routing. Disable Secure Shell (SSH) version 1. Ensure only SSH version 2.0 is used
17%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
17%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
17%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
installing the software locally and enter a proxy address of 127.0.0.1:8080 . You could also use a proxy auto-configuration (PAC) file to simplify the global network configuration; the required files
17%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
the pod's network namespace and assigns the IP address (Figure 1; eth0@if … boxes). The plugin creates an interface on the host's Linux bridge (think of a virtual L2 switch inside each host) and connects
17%
Update on Containers in HPC
08.07.2024
Home »  HPC  »  Articles  » 
MPI: """This example demonstrates recipe basics.   Usage: $ hpccm.py --recipe test2.py --format docker # hpccm.py --recipe test2.py --format singularity """   # Choose a base image Stage0.baseimage('ubuntu:16
17%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
; processes known as mongos route queries to the correct shard. The config server's metadata makes sure this happens. © MongoDB [3] Version 8.0 of MongoDB introduced embedded config servers, which means
17%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
it up. After the install, the graphical dashboard (Figure 6) automatically appears in your local web browser. You can call it up again later at any time by typing http://127.0.0.1:5572/ in the address
17%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
represents different aspects and functions within an industrial network. Levels 0, 1, and 2 relate to direct production control. Level 0 includes sensors and actuators that interact directly with the physical

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice