Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (642)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 78 Next »

8%
Linux device mapper writecache
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © lightwise, 123R.com
Identifying the storage volumes and configuring them is a pretty straightforward process (Listing 1). Listing 1 Storage Volumes $ cat /proc/partitions major minor #blocks name 7 0
8%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
be processed by WDAC in the same way as any other signed application. You can use catalog files [3] to block all unsigned applications and allow only signed apps and drivers to run. WDAC Policies Creating WDAC
8%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
Py code, but just in case you have not, this quick example creates an “empty” 2D array of size nx by ny : import numpy as np nx = 10 ny = 10 a = np.empty((nx,ny)) type(a) Array a is of data type numpy
8%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
the transmitted data. Even if someone does get hold of the private key and decrypts the recorded connection setup, an attacker doesn't get the session key. This process is also called "Perfect Forward Secrecy" (PFS
8%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
context Step 0 : FROM fedora ---> 7d3f07f8de5f Step 1 : MAINTAINER Thorsten Scherf ---> Running in e352dfc45eb9 ---> f66d1467b2c2 Removing intermediate container e352dfc45eb9 Step 2 : RUN yum update -y
8%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
/support/downloads/seatools/ Data Lifeguard Diagnostic: http://support.wdc.com/product/download.asp?groupid=810&sid=3&lang=en Drive Fitness Tools: http://www.hgst.com/support/index-files/simpletech-legacy-downloads#DFT
8%
Shell access via a web browser
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Roman Pyshchyk, 123RF.com
blocks it or if installing software on the local filesystem is not an option. All it takes is a PHP-capable web server to execute shell commands. PHP safe mode must be disabled for this to work – its ... 7
8%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
happens, memory should cause what is called a "machine check exception" (mce), which should cause the system to crash. After all, you are using ECC memory, so ensuring that the data is correct is important
8%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3
8%
AppScale AWS clone for private clouds
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Karel Mistrik on Unsplash
are paying for a technical option that they are not even using. Either way, when running infrastructure in your own data center, traffic and call costs do not scale in a linear way with requests. The factor

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice