Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • News (193)
  • Article (79)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 66 Next »

16%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
require serious bandwidth on the connected storage medium on the one hand and high compute power on the part of the CPU on the other. In the worst case, this leads to a single system slowing down an entire
16%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
banking. Integrity measurement is crucial to system integrity. When inadequately done, integrity evidence will be suspect. However, if done properly it leads to results that not only indicate when
16%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
that addresses both external threats and internal vulnerabilities. Misconfigured security rules, particularly in NSGs or Azure Firewall, can lead to the exposure of sensitive data or unauthorized access
16%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
and production environments. This uniformity can lead to significant savings with testing and troubleshooting future releases. Another benefit is that containers can be horizontally scaled; in other words, you can
16%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
continues with the remainder of the username, as defined by the Strip-User-Name = Yes parameter. The following entry thus leads to the authentication of a user who logs in as ADMIN.ppp . After the PPP
16%
Five HPC Pitfalls – Part 2
09.04.2012
Home »  HPC  »  Articles  » 
nodes. Poor file I/O performance can lead to poor utilization of your compute nodes and diminish the expected performance of your cluster. Parallel filesystems might be needed in the event that you have
16%
Network Grep
26.11.2012
Home »  Articles  » 
 
all of the required data on your screen and still store it in a pcap-compatible data file for later (the highly portable libpcap library format). Lead by Example Now we can gather our newly found
16%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
device in the list marked Local Standard Disks . Optionally, the Full disk summary and options link delivers more information about the highlighted device. A click on Continue first leads
16%
Configuration Management with puppet
30.04.2013
Home »  Articles  » 
 
, and automating the configuration steps can lead to uncertainty. Puppet takes a little time to set up, but I found that once I understood what the hell it was doing, I felt much more able to trust it – even
16%
Can Your Server Be Toppled with a Single Command?
01.10.2011
Home »  Articles  » 
 
connections. This approach leads to more effective logging. A more primitive approach might be to limit only new connections, but such a solution might be more suited to a SYN Flood attack, where you are purely

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice