Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (544)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 68 Next »

10%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
be processed by WDAC in the same way as any other signed application. You can use catalog files [3] to block all unsigned applications and allow only signed apps and drivers to run. WDAC Policies Creating WDAC
10%
Get started with OpenShift
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © andegro4ka, 123RF.com
features, along with the enterprise-level Red Hat support services, is based on the open source version of Kubernetes. Additionally, a community version, formerly called Origin, which then became OKD [3
10%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
Py code, but just in case you have not, this quick example creates an “empty” 2D array of size nx by ny : import numpy as np nx = 10 ny = 10 a = np.empty((nx,ny)) type(a) Array a is of data type numpy
10%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
the transmitted data. Even if someone does get hold of the private key and decrypts the recorded connection setup, an attacker doesn't get the session key. This process is also called "Perfect Forward Secrecy" (PFS
10%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
context Step 0 : FROM fedora ---> 7d3f07f8de5f Step 1 : MAINTAINER Thorsten Scherf ---> Running in e352dfc45eb9 ---> f66d1467b2c2 Removing intermediate container e352dfc45eb9 Step 2 : RUN yum update -y
10%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
/support/downloads/seatools/ Data Lifeguard Diagnostic: http://support.wdc.com/product/download.asp?groupid=810&sid=3&lang=en Drive Fitness Tools: http://www.hgst.com/support/index-files/simpletech-legacy-downloads#DFT
10%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3
10%
AppScale AWS clone for private clouds
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Karel Mistrik on Unsplash
are paying for a technical option that they are not even using. Either way, when running infrastructure in your own data center, traffic and call costs do not scale in a linear way with requests. The factor
10%
Save and Restore Linux Processes with CRIU
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Valentin Volkov, 123RF.com
it with the pre-dump parameter: criu pre-dump -t 2369 -D ~/checkpoint/pre Processes continue to run normally after this step. A new call to the command at any time updates the backup (Figure 7) by pointing
10%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
happens, memory should cause what is called a "machine check exception" (mce), which should cause the system to crash. After all, you are using ECC memory, so ensuring that the data is correct is important

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice