Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (112)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 150 Next »

17%
Veracode Report Tracks Security Flaws over the Application Lifecycle
23.01.2023
Home »  News  » 
 
More than 74 percent of applications have at least one security flaw, according to Veracode’s 2023 State of Software Security report. Additionally, 69 percent have at least one OWASP Top 10 flaw
17%
Tuning ZFS for Speed on Linux
17.03.2020
Home »  HPC  »  Articles  » 
share of users, some developers, and an entire community to support it. That aside, with a significant user base and the filesystem’s use for a wide variety of applications (HPC included), it often
17%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
for disk diagnostics, delivering a full set of data and values related to hard and solid state drives (Figure 3). Besides the current S.M.A.R.T. status, the program displays the temperature, speed, write
17%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
GKF8S 16 DDR3, Registered, ECC, 4 rank 8.710 0.54 AL24M72E4BKH9S 8 DDR3, Registered, ECC, 2 rank 6.132 0.77 AL12M72B8BKH9S
17%
Trend Micro Releases Cloud Security Assessment Tools
29.11.2012
Home »  News  » 
 
are designed to help plan and deploy security measures and defend against targeted cyberattacks. In response to 25 yes or no questions, the product produces an assessment of a company’s current security posture
17%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
 months ago  28.5 kB quay.io/centos/centos          latest      300e315adb2f  3 years ago    217 MB testuser@laytonjb-MINI-S:~$ podman pull alpine Resolved "alpine" as
17%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 -e package-list.txt Enter passphrase: Re-enter passphrase: Output filename is: package-list.txt.lrz package-list.txt - Compression Ratio: 2.537. Average Compression Speed:  0.000MB/s. Total time: 00:00:05.11 Listing 11
17%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
--retry 3 --retry-delay 0 --retry-max-time 60 ${JENKINS_UC}/jenkins.war -o ${JENKINS_HOME}/jenkins.war 30 RUN for P in ${PLUGINS}; do curl -sSfL --connect-timeout 20 --retry 2 --retry-delay 0 --retry
17%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
fsync 21 21 21 21 21 22 26 31 lseekm 3,848 766 2,946 762 739 738 757 3
17%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
. Current enterprise solutions for the virtualization of servers and desktops [3] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice