Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 189 Next »

10%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
space, but that is little help if a new customer appears out of the blue requiring 5TB of space for its image hosting service. As with computing components, the provider must be able to expand the cloud
10%
Routing with Quagga
19.02.2013
Home »  Articles  » 
configurations assign interfaces to individual areas. The routers then use multicast to exchange data via their LAN interfaces (on the multicast IP address of 224.0.0.5 ); this can optionally be authenticated via
10%
Rex
19.02.2013
Home »  Articles  » 
computers running the Linux distributions CentOS 5 and 6, Debian 5 and 6, Fedora, Gentoo, Mageia, openSUSE, RHEL 5 and 6, Scientific Linux, and Ubuntu 10.04, 11.04, and 12.04. Additionally, it can handle
10%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
) BT (4 cores) 11.95 66.5 272 CG (4 cores) 0.4 23.9 62.3 EP (6 cores) 1.4 5.46 21.05 FT (4 cores) 1
10%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Identification, MD5 Checksums, and File Extraction – Suricata can identify thousands of file types. Suricata also calculates MD5 checksums on the fly, so you can monitor changes to system files or search
10%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
shows some function call examples. Listing 1 Example Function Calls # Rounding up # 11 round(10.9) # Generate an array of numbers # [9, 8, 7, 6, 5, 4, 3, 2, 1] numbers.range(9, 1
10%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
or from Office and script files. The following sections look at the GUID and the effect of applying each rule. The rule with GUID BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 prevents the execution of programs
10%
Integrating FreeIPA with Active Directory
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © payphoto, 123RF.com
trust relationships between the domains that Windows sets up by default are responsible for this. Either Kerberos V5 or NTLM are used as protocols for this, although Kerberos is the default for Active
10%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
. You can use the AWS Free Tier [4] free of charge for 750 hours EC2, 750 hours RDS, and 5GB S3 storage. If you decide to continue, you'll need to choose a plan from one of the individual cost models
10%
Planned Obsolescence Needs to be Obsolete
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
of its slowness and inability to hold a charge. I had to purchase an iPhone 5 to have a usable device. My iPhone 4 and my iPhone 5 are both lying on my desk – in perfect shape but not in use, while my

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice