Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 160 Next »

38%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
). Figure 1: The Docker website lauds its containers as an instant solution. What the Kernel Does Not Isolate Docker relies on the Linux kernel's ability to create reciprocally isolated environments
38%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
expenditure was up 23  percent since this time a year ago. The report does not track direct cloud space allocations but measures server, disk storage, and Ethernet switch spending for cloud environments
38%
Regular expression security
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Jakub Jirsak, 123RF.com
, and the state machine accepts it. If further characters are read from the input, the machine proceeds to state 3 and does not accept the input. For each regular expression in your application, you can create
38%
Data Security vs. Data Protection
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Andrea Danti, 123RF.com
. However, this does not include data backups (i.e., the creation of backups to at least restore the availability protection target after unintentional manipulation or deletion). Protection and Security
38%
A storage engine for every use case
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Maikloff, Fotolia.com
primitive. It does not support transactions or foreign keys, and it is not even crash-safe. If MySQL crashes, some MyISAM tables will usually be corrupted. Although you can repair them with the REPAIR command
38%
Network performance in-terminal graphics  tools
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Lucy Baldwin, 123RF.com
active connection but does not rank the list unless asked to (-t). NetHogs [10] performs a role similar to netwatch but accomplishes this in a slightly different style by ranking traffic as generated
38%
Software inventory with PowerShell
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Andrea De Martin, 123RF.com
, infrastructure, and directory services. Two classes are of interest if you need an overview of installed software: the Win32_Product system library and the Win32Reg_AddRemovePrograms class. Win32_Product does
38%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
-bit and not the typical 32-bit keys. ZIP ZIP [12] is an archive file format, something along the lines of TAR. In addition to collecting files in a single archive file as tar does, zip can also
38%
VMware is hit by lawsuit contending GPL violation
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sean Gladwell, Fotolia.com
, or whether the open source components form a separate entity that merely interacts with the proprietary kernel, VMware argues that the VMware kernel does not violate the GPL and that the ESXi kernel contains
38%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
. Although the BSD license is a Free Software license, unlike the GPL, it does not provide a "copyleft" protection that forces developers to make their changes available to the community. For that reason

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice