Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 133 Next »

16%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
systems are similar and many system tools have the same name.) Our tests revealed some issues with the Ubuntu support at various points, although other tasks completed successfully on both Debian and Ubuntu
16%
Automated compliance testing with InSpec
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Gunnar Pippel, 123RF
of the test. The impact directive in line 2 establishes a point system to indicate how bad it is if the test in question fails. The points level and the actions resulting from them can be configured
16%
OpenShift by Red Hat continues to evolve
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © ktsdesign, 123RF.com
subject to elementary IT laws. Kubernetes as the engine of OpenShift comes with a few components that can be a genuine single point of failure if they malfunction. One example is the Kubernetes Master
16%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
or applications are also common: SharePoint, Salesforce, or Google, for example. The important point is that both sides know each other, which is ensured when setting up the trust with certificates. In the home
16%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
are of a fixed type predetermined during initialization – by default, floating-point numbers. The internal structure of the array allows the computation of vector and matrix operations at considerably higher
16%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
you set any values within an HTTP request as insertion points for a given variable. Although this sounds like a cryptic definition, it's easily understood with a basic example. Using the default sample
16%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
. The company says RHSS actually extends the capabilities of classical storage systems, pointing to "seamless scalability" and "perfect connections to the cloud." If you read between the lines of the marketing
16%
OPNids: Suricata with built-in machine learning
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © sarah maher, 123RF.com
-supplied analyzers evaluate traffic by unusual countries of origin or strange time stamps. In principle, it works like SpamAssassin. A specific number of points is assigned for individual criteria. If an event has
16%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
. Detection Algorithm The last of the previously mentioned criteria seems interesting from a programming point of view. How does an algorithm find groups of users who all rate the same products without having
16%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
and terminate, leaving an "orphan" instance that will never be removed or rebuilt by the system. Multiple DHCP servers could be used to prevent it from becoming a single point of failure. Configuration

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice