Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: ▉tippo365.com▉fortune gets app calling solution▉tippo365.com▉fortune gets app calling solutionyc5 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (405)
  • Article (96)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 51 Next »

7%
Finding and recording memory errors
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
on disk; if the second bit from the left is flipped from a 0 to a 1 (11011100), the number becomes 220. A simple flip of one bit in a byte can make a drastic difference in its value. Fortunately, ECC memory
7%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
like Fedora 20 or Ububtu 14.04 LTS. You can also find ready-made images for a virtualization solution like Docker. A simple docker graphite search shows a number of Graphite images. Of course, you can
7%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
), calling it 1:0 . Create a second HTB rule that will only be allowed a tiny amount of traffic and call it 1:5 . Use tc to create a filter and get it to match the MARK option set in step 1; then, watch
7%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
systems in this regard, because most of its commercial distributions (e.g., Red Hat and openSUSE) already provide inherent load balancing capabilities for most network services, such as web, cache, mail ... An IP-based load balancing solution
7%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
, I recommend you test SSHFS first before making a commitment. Infos NFS options: https://www.systutorials.com/docs/linux/man/5-nfs/ "Optimizing Your NFS Filesystem" by Jeff Layton: http
7%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
a plugin for it. [1]. Better Together You probably already have a solution for metric collection and alerting, such as Prometheus. However, Prometheus doesn't handle logs, so Fluentd and Fluent Bit can ... A modern logging solution
7%
News for Admins
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
 
://www.docker.com/press-release/build-cloud-solution-boosts-developer-productivity-accelerating-build-times/). Additionally, Docker Build Cloud, which is available now for existing Docker customers
7%
Where Does Job Output Go?
11.09.2023
Home »  HPC  »  Articles  » 
dropped. For example, today you can get consumer-grade 1-2TB SSD drives for well under $100, and I’ve seen some 1TB SSDs for under $30 (August 2023). Don’t forget that SSDs can range from thin 2.5-inch form
7%
Setting up MariaDB replication with the help of XtraBackup
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Kran Kanthawong, 123RF.com
], and Listing 5 show the steps needed for the sample installation. Listing 5 XtraBackup Installation wget https://repo.percona.com/apt/percona-release_0.1-3.wily_all.deb sudo dpkg -i percona ... If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid
7%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
troublemakers, the list does not take into account the individual attack situation, which is where dynamic blocking with Fail2Ban [5] comes into play (Figure 1). The tool assumes that every IP address

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 51 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice