Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 199 Next »

9%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
] and Docker [2], one of the primary goals for malicious actors is seeking to compromise a pod or Docker instance. Once they find a way to escape to the host, they can gain root access, resulting in critical
9%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
encryption, hard disk encryption, and SSH access. Whether this is true, and whether a Nitrokey is worth the cost, is what I intend to determine in this article. I am reviewing Nitrokey Storage 2, the most
9%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
>). Listing 1 docker-compose.yml version: '2' services: web: image: nginx:alpine restart: always container_name: nginx ports: - 8080:80 environment: - NGINX
9%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
is available free for the major platforms (e.g., Windows, Linux, Mac OS X, and Solaris), and it supports a wide number of guest systems, including exotics such as DOS/WIN 3.1 and OS/2. Installing Virtual
9%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
, Fortran 90, and Python (2.x series). I’ll be running the examples on a single 64-bit system with CentOS 6.2 using the default GCC compilers, GCC and GFortran (4.4.6), as well as the default Python (2
9%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
writing code. Columns 1 to 5 could be used for statement labels such as the following: ...       SUM = 0.0       D0 100 I=1,10          SUM = SUM + REAL(I)  100  CONTINUE ...       Y = X1 + X2 + X3
9%
Preload Trick
11.05.2021
Home »  HPC  »  Articles  » 
sizes (Listing 1). The second script (Listing 2) is the same as Listing 1, but uses double precision. Listing 1: Single-Precision Square Matrix Multiply # Example SGEMM   for N = [2, 4, 8, 16
9%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
(and looks like) a 200-pin DDR2 SO-DIMM (Figure 2). Several versions of the Compute Module came out until the Raspberry Pi Compute Module 4 (CM4, launched in 2020). The CM4 is more like a small credit
9%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
can opt for a 3072-bit RSA key, which also gives you 128 bits of encryption. 2. KeyManagement What is more important than the length of the key in practice, however, is the way the admin handles
9%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
, which is also known as MFA, two-factor authentication, two-step verification, TFA, T-FA, or 2FA, is an authentication approach that requires two or more core factors. It requires something you know (your

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice