Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (540)
  • Article (199)
  • News (35)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 78 Next »

17%
Tech News
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
 
Huge DDoS Attack over HTTPS is Discovered and Stopped The security company Cloudflare has announced that it detected and mitigated a 15.3 million request-per-second (rps) denial of service attack
17%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
techniques and compression algorithms. Public key: RSA EIGamal DSA Cipher: IDEA 3DES CAST5 [Symmetric-key block cipher. 64-bit block size, key size between 30 and 128 bits
17%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
since version 2007, which is the basic prerequisite for using the corresponding API. In addition, you need the Exchange Web Services Managed API 2.2 [1]. If you only use Exchange locally, the EWS API
17%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
and the other on all IPv6 IP addresses. Listing 1 Checking Open Ports chris@DebianBox:~# lsof -i :22 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sshd 3328 root 3r IPv4 33323 0t0 TCP *:ssh
17%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
is like adding a virtual cable between your two VPCs (Figure 3). You need to accept this peering in a separate step. So that the VMs can find their way out of the outer VPC later on, you now need to create
17%
Verifying your configuration
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kritiya Sumpun, 123RF.com
: lt: 90 port: tcp:22: listening: true ip: - 0.0.0.0 tcp6:22: listening: true ip: - '::' user: sshd: exists: true package: docker-ce: installed: true service
17%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
.9 Ready 3h v1.6.2 Listing 2 Kubernetes Node Data Structure in YAML $ kubectl get node 10.126.22.9 -o yaml apiVersion: v1 kind: Node metadata: creation
17%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
. Listing 3 Output After Unbanning IP Address $ sudo iptables --L --n Chain INPUT (policy ACCEPT) target prot opt source destination f2b-default tcp -- 0.0.0.0/0 0
17%
Whitepaper: AMD “Bulldozer” Architecture
10.11.2011
Home »  HPC  »  Vendors  »  AMD  » 
 
. • 6 and 8 cores available • 1/2 socket; 2 memory channels • Less than 5 watts per core3 • Easily integrated into existing AMD Opteron 4000 Series platforms
17%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
    0 349.7M  1 loop /snap/gnome-3-38-2004/143 loop4    7:4    0 485.5M  1 loop /snap/gnome-42-2204/120 loop5    7:5    0   497M  1 loop /snap/gnome-42-2204/141 loop6    7:6    0  81.3M  1 loop

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice