Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%2222%A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (274)
  • Article (136)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 Next »

45%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
're looking to do so. Rat-a-tat-tat In this article, I'll run through the installation of the aforementioned knockd on Debian and Ubuntu. Barring the procedure behind the package install, I would hope
45%
System logging for data-based answers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Gerard Boissinot, Fotolia.com
the really cool Linux tool logger [2], which allows a user to write a message to the system logs. For example, you could easily run the command $ logger "Just a notification" to write a message
45%
Programming with Node.js and JavaScript
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise 123rf.com
been niche products compared with Rails and PHP frameworks. The situation is different with the Node.js platform (or Node for short) [2], which has been extremely popular for several years and has
45%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
command: $ cat /var/lib/mysql/testDB/testTB.ibd | head -n 20 The command output will generate plaintext information containing raw data stored in the corresponding database table. Key Management ... Advanced MySQL security tips (a complete guide)
45%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
logically separate individual parts of the system (Figure 2). A network namespace, for example, lets you create virtual network cards without giving them direct access to the physical NICs of the host
45%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
for most common databases. Redundancy and Scalability Databases are a central component of most complex setups. True to the motto "a special tool for every task," a long-established practice is to let
45%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
the number of processes from 1 to 64, you can see in Figure 2 how the wall clock time on the y -axis is affected by the number of processes on the x -axis
45%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
to and including 9.2, listened for events. Events trigger, for example, read and write operations on the disk. To handle this kind of interruption, the system stores the CPU state to continue working at the same
45%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
persistent storage can be connected without problem. Containers, on the other hand, present a different battle plan: Kubernetes [2] (Figure 1), Docker [3], and the many alternatives somehow all have
45%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
considerable growth, especially in the areas of machine learning and big data. However, GCP is also very much in the running in the classic Internet-as-a-Service (IaaS) arena. Monitoring is definitive

« Previous 1 ... 34 35 36 37 38 39 40 41 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice