Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (583)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 71 Next »

6%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
straightforward. If a processor was operating at a fixed frequency of 2.0GHz, CPU utilization was the percentage of time the processor spent doing work. (Not doing work is idle. ) For 50% utilization, the processor
6%
Wireshark
27.11.2011
Home »  Articles  » 
 
for the required fields. The main feature of the new version is support for more than 30 new protocols including JSON, Wi-Fi P2P (Wi-Fi Direct), and Fibre Channel over InfiniBand. Also, Wireshark 1.6.0 can export
6%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
on the Internet, and administrators need to rely on proprietary support in case of problems. With a response time of 48 hours, the risk is that users will not be able to work with the mail system for two days, so
6%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
metadata... 18 Wrote 0.00 MiB of compressed metadata. After creating an S3QL filesystem, I checked the mountpoint, /mnt/data1 (Listing 2). A few files are created as a result of the S3QL filesystem ... advantages: S3QL. ... S3QL filesystem for cloud backups
6%
Effective debugging of Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Stuart Monk, Fotolia.com
in the worst case, the container crashes immediately after the docker run command. When starting a Docker container, two entries in the Dockerfile play a role: ENTRYPOINT and CMD. Many administrators don
6%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
-Forwarded-Proto" expr=%{REQUEST_SCHEME} ProxyPreserveHost On ProxyPass / http://127.0.0.1:4711/ ProxyPassReverse / http://127.0.0.1:4711/ ServerName www.example.com Server
6%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
Windows Server 2016's default settings might not always meet your network requirements. Depending on its purpose, the server requires different tweaks to unleash its true performance
6%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
A distributed denial of service (DDoS) attack on Spamhaus [1] (Figure 1), a provider of real-time DNS blacklists, affected a part of the Internet last March with a flood of data reported to reach ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... DDoS in the Cloud
6%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
/en-us/marketplace/ Microsoft Power BI: https://powerbi.microsoft.com/en-us/ The Author Thomas Joos is a freelance IT consultant and has been working in IT for more than 20 years. In addition, he writes hands
6%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
vulnerability (CVE-2015-0311) to run TeslaCrypt on the system. A check is performed to see whether the URLReader2 COM interface has been installed correctly in the DirectShow Filter Graph List [1]. The malicious

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice