Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (416)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 59 Next »

24%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
-cri.conf <6tables = 1 EOF # sysctl --system [ ... Preconditions ... ] # apt-get update # apt
24%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which
24%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
containers can be found online [6]. For a better understanding of the setup, a brief introduction to the OpenShift PaaS framework follows before I then look at the configuration of the storage system. Open
24%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
24%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
According to a study by the Lawrence Berkeley National Laboratory, storage systems still accounted for eight percent of total data center energy consumption in 2014 [6]. In 2016, the share had already risen
24%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Infrastructure as a Service (IaaS) [4], Red Hat Cloud with Virtualization Bundle [5], and Open Architecture IaaS service [6], are designed to support companies who want to build their own private, public
24%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
)   # end for     # Write to new files nfiles_new = 11   # Number of new files to write   total_len = input_data.shape[1]   # ny   # Number of new elements per file n1_new
24%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle
24%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
through the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework [3]. SQLmap supports any popular database system, such as My
24%
Julia: Fast as Fortran, easy as Python
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Suslov, 123RF.com
Julia julia> 1//2 + 1//3 5//6 julia> numerator(10//12) 5 julia> 2//3 == 4//6 true julia> 2//3 == 4/6 false After strings and the various types of numbers, the most important built-in data type

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice