Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1198)
  • Article (312)
  • News (179)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 170 Next »

36%
5 Million Google Passwords Leaked
16.09.2014
Home »  News  » 
 
Account names and passwords for 5 million Gmail accounts were leaked to Russian forums. A 50MB zip file containing the account names and clear-text passwords has appeared on various sites. Google ... Cyber-snoopers post a 50MB zip file with account names and passwords for millions of Google accounts.
36%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
the older UFS filesystem rather than ZFS. Built-In RAID With FreeNAS, you can set up software RAID levels 0, 1, 3, and higher, but again, you need to be aware that hardware RAIDs are faster and safer ... Setting up your own NAS with FreeNAS 8.0.2
36%
CoreOS 1122.2.0 (64-bit) & NethServer (multiarch)
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
 
  CoreOS 1122.2.0 (64-bit) CoreOS is a lightweight Linux operating system for managing ... CoreOS 1122.2.0 (64-bit) & NethServer (multiarch)
35%
HPC Storage strace Snippet
26.01.2012
Home »  HPC  »  Newsletter  »  2012-02-01 HPC...  » 
 
32KB < < 128KB 64 128KB < < 256KB 0 256KB < < 512KB 2 512KB < < 1MB 3 1MB < < 10MB 87 10MB < < 100MB 0 100MB < < 1GB
35%
HPC Storage strace Snippet
15.02.2012
Home »  HPC  »  Newsletter  »  2012-02-15 HPC...  » 
 
32KB < < 128KB 64 128KB < < 256KB 0 256KB < < 512KB 2 512KB < < 1MB 3 1MB < < 10MB 87 10MB < < 100MB 0 100MB < < 1GB
35%
Zero-Ops Kubernetes with MicroK8s
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
T), thanks to a binary of just 100MB. The perfect laboratory companion that offers immediate access to Kubernetes is the clever minikube [2]. Another distribution caught my eye recently when I was arriving ... A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM.
34%
Valkey 8.0.0 Released
18.09.2024
Home »  News  » 
 
The Valkey project has released Valkey 8.0.0, marking the first major release since the project became generally available earlier this year. “The project continues the traditions of the seven ... Valkey 8.0.0 Released
33%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
(Listing 3). Listing 3 Defining Replication Factors 01 # dog vdi list 02 Name Id Size Used Shared Creation time VDI id Copies Tag 03 one.img 0 4.0 MB 0.0 MB 0.0
32%
Zsh 5.0 Released
15.08.2012
Home »  News  » 
 
Zsh 5.0 is the first major stable release since version 4.2, which was released in 2004. The announcement states that many changes have been made since the last stable release series, of which ... The developers of the Z shell for Unix and Unix-like operating systems announce the release of zsh 5.0.0. ... Zsh 5.0 Released
32%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... by normal users. But there’s a flaw – although the mechanism is still reasonably easy to enable (in the new v0.56, three lines in /etc/ceph/ceph.conf are all it takes), activating CephX will make many ... We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 170 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice