Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (416)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 59 Next »

24%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
 MB p s  or Peak IOPS is  x . However, what does “IOPS” really mean and how is it defined? Typically, an IOP is an I/O operation, wherein data is either read or written to the filesystem
24%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
.DevCenter/devcenters/attachednetworks@2024-02-01' = { 18 name: networkConnection.name 19 parent: devcenter 20 ... } 21 22 resource devcenterGalleryImage 'Microsoft.DevCenter/devcenters/galleries/images@2024-02-01' existing = { 23
24%
Hadoop for Small-to-Medium-Sized Businesses
06.05.2014
Home »  HPC  »  Articles  » 
media, and the entertainment industry, including Amazon Web Services, AOL, Apple, eBay, Facebook, Netflix, and HP. However, Hadoop 2.2.x is especially appealing for smaller companies with tight budgets
24%
GUI or Text-Based Interface?
05.12.2018
Home »  HPC  »  Articles  » 
. Figure 3: Sample pop-up dialog from Bash script: dialog --title "Message" --msgbox 'Your job is done' 6 20 If you are interested in writing TUIs for system administration, a great place to start
24%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
| sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- This command string correctly prepares the -Shellcode parameter value. When passed to -Shellcode without specifying a process ID, the Invoke
24%
News for Admins
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
 
release to the encryption toolkit to address a "certificate forgery" issue. The problem affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o. According to the security advisory (CVE-2015
24%
News for Admins
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
 
Bad is affecting millions of devices around the globe. CNET reports that the majority of victims are from India (1.35 million) and China (1.6 million). The US is not immune to HummingBad, with over 288,800 infected
24%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
enabled show view winget show vscode Show information about a package source – winget source add -n mypckgsource -t Microsoft.REST -a https
24%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
-cri.conf <6tables = 1 EOF # sysctl --system [ ... Preconditions ... ] # apt-get update # apt
24%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice