Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (346)
  • Article (121)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 47 Next »

12%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
to Joe talk about all things Linux security in the weekly Ubuntu Security Podcast (https://ubuntusecuritypodcast.org). When not tinkering with electronics or code, Joe can be found somewhere outside
12%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
setup ends up on virtual machines running on a cloud service provider's platform. A physical layout often is based on a tree structure (Figure 1), with the admin connecting all the servers to one or two
12%
Alternative virtualization solutions when OpenStack is too much
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © elnur, 123RF.com
, "cloud" also means infrastructure automation, Infrastructure as Code (IaC), immutable underlay, microarchitecture, and so on. Although OpenStack development has slowed, it still remains a complex construct
12%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
, Falco, Harbor, Xray, and Qualys Container Security. All these tools promise more or less the same thing: They take the tedious task of comprehensive security monitoring for the local container zoo off
12%
Preload Trick
11.05.2021
Home »  HPC  »  Articles  » 
, 32, 64, 128, 256, 512, 1024, 2048, 4096, 8192]      A = single( rand(N,N) );    B = single( rand(N,N) );      start = clock();    C = A*B;    elapsedTime = etime(clock(), start);      gFlops = 2*N*N*N / (elapsedTime * 1e+9);      disp(sprintf("N = %4d
12%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
Linux distribution (CentOS), my configured repos are as shown in Listing 1. Listing 1 Configured Repos 01 $ sudo yum repolist | grep microsoft 02 packages-microsoft-com-mssql-server-2017
12%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
have a suitable vantage point to measure the target (Figure 1). Measurements must be produced in a reliable way and protected from unauthorized modification. Integrity systems assess measurements through
12%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
update --init Next, pick up the source code for the official Debian package from Nginx: cd /usr/src mkdir nginx cd nginx apt-get source nginx cd nginx-1.10.3 The sources contain a debian/rules file
12%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
to be installed on each node. By default, the Pi Zero nodes are named p1.local , p2.local , p3.local , and p4.local . If you look at the ClusterHAT from above, at one end you can see the labels p1, p2, p3, and p4
12%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
(s):                       1 NUMA node(s):                    1 Vendor ID:                       AuthenticAMD CPU family:                      23 Model:                           49 Model name

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice