Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (770)
  • Article (213)
  • News (112)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 110 Next »

9%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
     color: "Red", 11     Model year: 1988 12   } 13 }; Programmers can use variables directly; the appropriate var s are added by CoffeeScript when you compile. As in shell scripts, the hash sign (# ) starts
9%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
, Postscript, PDF, PNG, SVG, and XML formats. Listing 2, for example, shows the plain text output for a two-socket, eight-core server. Listing 2: lstopo Textual Output. 01 Machine (24GB) 02   NUMANode P#0 (12
9%
Tuning Your Filesystem’s Cache
16.02.2012
Home »  Articles  » 
 
 [OOOOOOOOOOOOOOO] 15/15 09  10   Files: 1 11   Directories: 0 12   Touched Pages: 15 (60K) 13   Elapsed: 0.001102 seconds 14 $ The -t option “touches” the pages of the file, causing it to be loaded into the page
9%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
for this example: Order Deny,Allow Deny from All Allow from 12.12.12.12 Allow from 23.23.23.23 Allow from 34.34.34.34 This example denies access to everybody except the IPs listed, which follows the very sensible
9%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
as reliably as the rest of the PKI world. 4. Protocols A public website must support the TLS 1.0, TLS 1.1, and TLS 1.2 protocols. SSL 2 is obsolete and insecure. SSL 3 is also deprecated and, although
9%
News for admins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
CC BY 3.0
be in memory," said Guinet on the project page. The WannaCry ransomware attack has been the worst attack of its kind. The attack started on Friday May 12, 2017 and infected more than 230,000 computers across
9%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
": "glusterfs-cluster" 06 }, 07 "subsets": [ 08 { 09 "addresses": [ 10 { 11 "ip": "192,168,121,101" 12 } 13 ], 14 "ports
9%
Planned Obsolescence Needs to be Obsolete
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
out the window for tech that I'll have to replace in 12 to 18 months. And now we're told that certain vendors slow down tech that is only slightly out of date. That's taking planned obsolescence a bit
9%
Into the Cloud for Security
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Tomasz Pacyna, 123RF.com
to sleep at night knowing that your network is vulnerable, unwatched for at least 12 hours a day, and probably compromised so badly and so stealthily that you won't be able to find that you've been
9%
The Dilemma of the Ten-Second Commute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Larry Ewing (lewing@isc.tamu.edu) and The GIMP; Tux added protection by Maria
it that problematic. Yes, we spent a lot of time working. Rather than a typical eight to nine hours per day, we logged somewhere between 10 and 12 hours. We were also on call, and once the layoffs started in October

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 110 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice