Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 99 Next »

15%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
, and remote computers. However, if you want to secure running containers, it is not enough to just look at the host's INPUT chain and filter incoming traffic. As a firewall administrator, you might know
15%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
, affects more systems than previously thought. In a recent post, the company said the hidden backdoor with a hard-coded password, which the company described as a "remote management feature," had been
15%
A full virtualizer and an alternative to containers
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Antonio Gabola on Unsplash
the considerations of hip development paradigms, the Firecracker API at Amazon also has some very practical uses: Users can launch Firecracker VMs directly. Libvirt offers a similar remote control function
15%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
. You can interactively zoom into the graphs and export to a PDF and various graphic formats. Instead of a logfile, you could specify an SSH command that retrieves data from a remote machine
15%
Best practices for KVM on NUMA servers
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Joe Belanger, 123RF.com
to access pages located in remote node  1, 1.7ns for pages in nodes  2 and 3, and 1.9ns to access pages in nodes  4-7. On some servers, ACPI does not provide SLIT table values, and the Linux kernel populates
15%
News for Admins
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
 
carrying out complex workflows that may include near real-time remote sensor data ingestion and big data analysis, interactive data exploration and visualization as well as large-scale computation. … One
15%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
. The TCP-only delivery speed is therefore twice as fast. Unfortunately, no IW is optimal for all cases. For local servers, an IW of 20 should be fairly harmless. If you are sure that most of the remote
15%
News for Admins
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
 
would remotely jailbreak Mansoor's iPhone and install spyware on it. "Once infected, Mansoor's phone would have become a digital spy in his pocket, capable of employing his iPhone's camera and microphone
15%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
modules at the bottom of Listing 1 (rcmd is the remote command used by pdsh) states that only ssh and exec are available. If rsh was not excluded, it would be listed here, too, and it would be the default
15%
Many approaches help secure a web server
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © alexwhite, 123RF.com
entire classes of attacks, such as SQL injections, cross-site scripting, or remote code execution. If you move the application data of your web server to its own partition, you can still implement some

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice