Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (617)
  • Article (146)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 78 Next »

9%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
and lets you know of changes or foul play on the data link layer. P0f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
9%
Tuning Your Filesystem’s Cache
16.02.2012
Home »  Articles  » 
 
 [OOOOOOOOOOOOOOO] 15/15 09  10   Files: 1 11   Directories: 0 12   Touched Pages: 15 (60K) 13   Elapsed: 0.001102 seconds 14 $ The -t option “touches” the pages of the file, causing it to be loaded into the page
9%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
Resident Pages: 0/15 0/60K 0% 05 Elapsed: 8.1e-05 seconds 06 $ ./vmtouch -vt /bin/gzip 07 /bin/gzip 08 [OOOOOOOOOOOOOOO] 15/15 09 10 Files: 1 11 Directories: 0 12 Touched Pages: 15 (60K) 13
9%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
, a high-quality password, some form of two-factor authentication, or both will make it more difficult for the attacker to succeed. See Guido Vranken's blog [https://guidovranken.wordpress.com/2015/12
9%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
(unew(i,j)-u(i,j)) ) 141 ENDDO 142 ENDDO 143 144 IF(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff 145 146 ! Update solution 147 DO j=2,m-1 148 DO i=2,m-1 149 u(i,j) = unew
9%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
that assumes a Xubuntu Desktop 12.04.4 LTS instance. If you're not familiar with R, the R Project for Statistical Computing states: "R is a free software environment for statistical computing and graphics
9%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
12        7:12   0  40.8M  1 loop /snap/snapd/20092 sda           8:0    0   5.5T  0 disk |---sda1        8:1    0   5.5T  0 part /home2 nvme1n1     259:0    0 953.9G  0 disk |---nvme1n1p1 259:2    0
9%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
the old cache for a maximum of 12 hours. Listing 3 Heart Rate Monitor 01 backend default { 02 .host = '127.0.0.1'; 03 .port = '8080'; 04 .probe = { 05 .url = "/"; 06 .timeout
9%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
signatures. And the successors of SSL, TLS 1.0 and 1.1, do not improve on this; it is not until TLS 1.2 that TLS began to support newer algorithms with SHA-2. On the server side, you need version 1.0
9%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
Interfaces: 12 - DeviceIndex: 0 13 NetworkInterfaceId: 14 Ref: fgteni1 15 - DeviceIndex: 1 16 NetworkInterfaceId: 17 Ref: fgteni2 18 UserData: 19

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice