Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 98 Next »

8%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
The Joblib Python Library handles frequent problems – like parallelization, memorization, and saving and loading objects – in almost no time, giving programmers more freedom to push ... data to the local hard disk or across the network, rather than processor power, the number of processes can be higher. As a rule of thumb, you can go for the number of available processor cores times 1 ... The Joblib Python Library handles frequent problems – like parallelization, memorization, and saving and loading objects – in almost no time, giving programmers more freedom to push
8%
Parallelizing and memorizing Python programs with Joblib
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
of available processor cores times 1.5; however, if each process fully loads a CPU permanently, you will not want to exceed the number of available physical processors. See How They Run Additionally ... The Joblib Python Library handles frequent problems – like parallelization, memorization, and saving and loading objects – in almost no time, giving programmers more freedom to push
8%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
a legitimate system but is going to an unknown network. This traffic is often encrypted. Suspicious traffic that occurs over a long period of time. If I were going to attack a system, I would first discover
8%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
Point Is? To whet your appetite further, I’ll now get to the good stuff and cover a useful Docker-orientated auditing rule. Inside your rules config file (this is the last time I’ll remind you that it’s
8%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
each time. As an example, an authorization tool's logfiles prompt for user passwords (such as sudo), SSH sessions, and such. Their usage is tracked by the /var/log/auth.log file. Depending on how your
8%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
.sock file, run df -h | grep sock to show that the mounted folder is present on the container. Assuming your NGINX container does not come with Docker pre-installed, go ahead and install it: apt update
8%
Securing containers with Anchore
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © loiic, Fotolia.com
dependencies are met. Password123 To prevent saving your credentials to a file, you have to set the environment variables manually each time you log in to a terminal to use Anchore: $ export ANCHORE
8%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Figure 2: Google has offered two-factor authentication for Google services for some time. Google primarily developed Authenticator to add strong authentication for access to its applications
8%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
'm going to be discovered." One mistake during any of the phases (e.g., discovery, persistence, escalation, data egress), and the hacker will get caught. It's the responsibility of the pen tester
8%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
on special tools to keep an eye on their networks. These methods, however, are no longer sufficient, and they are very inefficient in terms of analysis. ATA uses machine learning technologies and real-time

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice