Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1250)
  • Article (320)
  • News (209)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 179 Next »

10%
ORNL Seeks Participants for 2020 Data Challenge
10.06.2020
Home »  HPC  »  News  » 
 
until June 22. All teams must submit a 6-8 page paper describing their solution by July 27. Top entries will be invited to attend the SMC2020 conference on August 25-27 in Kingsport, Tennessee to present
10%
Veracode Report Tracks Security Flaws over the Application Lifecycle
23.01.2023
Home »  News  » 
 
as the occurrence of flaws over the application lifecycle. “While over 30 percent of applications show flaws at the first scan, this number drops to approximately 22 percent shortly after before rising to 30 percent
10%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
filesystem. Administrators should back up Windows systems with some other software if possible. Self-Build If you to build Duplicity 0.7 yourself, you need the following programs and libraries
10%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
addr = 10.42.0.101:6789 14 [mon.b] 15 host = bob 16 mon addr = 10.42.0.102:6789 17 [mon.c] 18 host = charlie 19 mon addr = 10.42.0.103:6789 20 [osd.0] 21 host = alice 22 [osd.1] 23 host
10%
News for Admins
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
 
analyzes cyberattacks and identifies various threats, impacts, and trends over a two-year period. JupyterLab 4.0 Now Available The Jupyter community has released JupyterLab 4.0, which offers faster ... ; IEEE Releases New Standard for LiFi Communications; EU Health Sector Security Risks; and JupyterLab 4.0.
10%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
: Stream Benchmarks   Name Kernel Bytes/Iteration FLOPS/Iteration COPY a(i) = b(i) 16 0 SCALE a(i) = q*b(i) 16 1 SUM
10%
Plundering treasures with Gitrob
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © pip, photocase.com
Hub releases page [7]. I went with gitrob_linux_amd64_2.0.0-beta.zip, which is a little more than 6MB in size and 21MB uncompressed. After downloading the file (e.g., with wget), I checked that the binary suited
10%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
10%
Interprocess communication essentials in Perl
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Carsten Reisinger, 123RF.com
waitpid(-1, 0); 20 } else { 21 close READFROMCHILD; 22 close WRITETOCHILD; 23 $thisdata = ; 24 print "The child process read $thisdata"; 25 print WRITETOPARENT "The child process
10%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 179 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice