Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (492)
  • Article (146)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 66 Next »

11%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
-flannel-ds-arm-vdprb 1/1 Running 3 26d kube-flannel-ds-arm-xnxqp 1/1 Running 0 26d kube-flannel-ds-arm-zsnpp 1/1 Running 4 34d kube-proxy-lknwh 1
11%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
": "0x0800" 07 } 08 }, "ip-match": { 09 "ip-protocol": 17 10 }, "ipv4-destination": "10.1.1.2/32", "udp-destination-port": 1234 11 }, "table_id": 0, "priority": 10 12
11%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
Definition), against which all requests get validated as soon as they are received by one of the processing servers. Listing 2 Request XML 0" encoding="UTF-8"?>
11%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
(KafkaProducerString, producer = new KafkaProducer(props)) { 03 04 for (long i =**0; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
11%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
and lets you know of changes or foul play on the data link layer. P0f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
11%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
attached (Figure 12). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
11%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
://istio.io Vitess for MySQL: https://vitess.io/docs/archive/12.0/reference/compatibility/mysql-compatibility/ The Author Martin Loschwitz
11%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
_init_remote(&unw_cursor, g_unw_as, unw_ctx)); 05 06 /* - Search - */ 07 bool found_stack_entry = false; 08 do { 09 unw_word_t ip = 0; 10 unw_get_reg(&unw_cursor, UNW_REG_IP, &ip); 11 12 Dwfl_Module* module = dwfl
11%
What's Ahead for OpenMP?
05.12.2011
Home »  HPC  »  Articles  » 
-oriented programming by adding various features in 3.0 and 3.1. Subsequently, I was asked to lead the Error Model subgroup, tasked with designing an Error Model for OpenMP that would allow it to move beyond traditional
11%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
library, including the matching developer files. On Ubuntu, the packages go by the names of lua5.1 and liblua5.1.0-dev ; openSUSE users will need lua-devel and liblua5

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice