Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (530)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 71 Next »

23%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
-cri.conf <6tables = 1 EOF # sysctl --system [ ... Preconditions ... ] # apt-get update # apt
23%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
)   # end for     # Write to new files nfiles_new = 11   # Number of new files to write   total_len = input_data.shape[1]   # ny   # Number of new elements per file n1_new
23%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
prevents a very common method of permanently embedding malware on a system. You can block calls to the Win32 API from within Office applications with rule 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B , which
23%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
containers can be found online [6]. For a better understanding of the setup, a brief introduction to the OpenShift PaaS framework follows before I then look at the configuration of the storage system. Open
23%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
23%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
According to a study by the Lawrence Berkeley National Laboratory, storage systems still accounted for eight percent of total data center energy consumption in 2014 [6]. In 2016, the share had already risen
23%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Infrastructure as a Service (IaaS) [4], Red Hat Cloud with Virtualization Bundle [5], and Open Architecture IaaS service [6], are designed to support companies who want to build their own private, public
23%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
Provides access from MobaXterm to the Git version management system. FVWM2 One of the first and oldest Windows managers for X11. Xorg (legacy) Installing the old X11 (Xorg v1.6
23%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
minutes between backups These settings create 22 files per day (one full backup and 21 incremental backups) on the NAS. The full backups are easily identifiable by the .spf file extension; incremental
23%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice