Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (343)
  • Article (116)
  • News (108)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 57 Next »

17%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
is made possible because cron only checks for a date format and not that the date of the task is legitimate. The crontab date specification for CronRAT is 52 23 31 2 3, which would generate a runtime error
17%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
.0.0.0/0 45 - IpProtocol: udp 46 FromPort: 0 47 ToPort: 65535 48 CidrIp: 0.0.0.0/0 49 VpcId: 50 Ref: FortiVPC 51 52 InstanceProfile: 53 Properties: 54
17%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
monitoring data, then you will be limited in how many metrics, how frequently, and how many nodes can push data to the collection node. A shared GigE (1,000Mbps) network used for application communications
17%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
, network latency, and on and on. I could spend 1,000 pages discussing the problems that influence page load time and never address the bigger picture I endeavor to tackle in this article. Herein, I focus
17%
TinyDNS
02.03.2012
Home »  Articles  » 
 
, and because of its diminutive code base, exceptionally secure. How secure? You might well ask Well, how does a US$ 1,000 reward sound if you discover a security hole? You have to admit that such an offer
17%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
. (From AV-TEST Institute [1], which registered more than 55,000 malicious programs every day.) Although regular updates of signature databases used in virus scanners and intrusion detection systems
17%
Routing with Quagga
19.02.2013
Home »  Articles  » 
to the networks of all other autonomous systems. Thus, the routing tables are correspondingly large (some 400,000 entries in April 2012.) In contrast to OSPF, admins must configure the connection between two
17%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
to do on a single node can be done on a large number of nodes using a parallel shell tool. If you try to use a parallel shell on a 50,000-node cluster, however, the time skew could be large enough
17%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
important because it determines packet fragments on the network. If your chunk size is 8KB and the MTU is 1500 , it will take six Ethernet frames to transmit the 8KB. If you increase the MTU to 9000 (9,000
17%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
 PROGRAM PTR_TEST2 In this example, the pointer PTR2 points to a single real value, and the pointer PTRA points to a block of dynamic memory for 1,000 real values. After you’re done using the block of memory, you

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice