Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: viral ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (113)
  • News (30)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 73 Next »

16%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
of Focus in Cloud Computing V2.1: http://www.cloudsecurityalliance.org/csaguide.pdf PCI Data Security Standards Documents: https://www.pcisecuritystandards.org/security_standards/documents.php Security
16%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
, and thus also virsh, can basically control virtual machines on Qemu/KVM, Xen, LXC, OpenVZ, VirtualBox, Microsoft Hyper-V, and VMware ESX, GSX, Workstation, and Player. For this to work, libvirt needs
16%
Load test your website with Siege
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Aarón Blanco Tejedor on Unsplash
and execute the command: sudo apt-get install siege -y That's it. Siege is installed. To install from the source code, download the latest version of the file [2] and enter the following commands to extract
16%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
for the Juju orchestration tool, Open vSwitch 2.4.0, and the Ceph 0.94.3 "Hammer" distributed storage system. Ubuntu provides separate editions for various IT use cases, including Desktop and Server, as well
16%
Many approaches help secure a web server
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © alexwhite, 123RF.com
be reached with 2,048-bit prime number parameters. To reach the full 100 points, calculate a 4,096-bit prime number and limit the elliptic curves used to secp521r1, secp384r1, and prime256v1. To do this
16%
The simpler alternative to cron: Whenjobs
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© stillfx, 133RF.com
One of the many heirlooms from early Unix (since V7 Unix to be exact) is the cron daemon, which still runs regular jobs on today's Linux and BSD systems. Although some alternatives to cron have
16%
User File Recovery
19.04.2018
Home »  HPC  »  Articles  » 
this help and exit --version Output version information and exit Next, you should examine the m v man page. It, too, has a few key options (Table 2). The mv command takes the forms
16%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
As soon as a machine becomes accessible over the Internet, attacks start to rain down on it. Tools such as Fail2ban help against brute force attacks but are not a panacea. A DIY script offers
16%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
. Simple Option – pdsh and uptime In part 2, Installing and Configuring Cluster Tools, pdsh was installed on the master node so you could run the same command on a range of nodes. Therefore, you can use
16%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
with the arrival of VMware [1], KVM [2], and Hyper-V[3], because virtualization makes it easy to jump-start new computers. New computers nearly always require an IP address and network integration. In the past

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 73 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice