Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (257)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 29 Next »

75%
Enlarging the TCP initial window
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Jani Brumat on Unsplash
Impact on Performance, 2019: https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf HTTP/3: https://en.wikipedia.org/wiki/HTTP/3 QUIC: https://blog.cloudflare.com
74%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
of letters with similar-looking numbers and symbols), which is popular on the Internet. For example, the filter normalizes the string "Kn3rm@nn!" to "knermann" and rejects the password change. You can draw ... P@ssw0rdis@s3cr3t!
74%
Exploring OpenStack's Trove DBaaS
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Brian Kenney, 123RF.com
, the customer isn't supposed to be troubled with setting up the database in today's IT environment. Users expect to be able to set up a service in the cloud with a mouse click. These considerations have led
74%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
of profiling [2], I have focused on individual applications, either serial or parallel [3]. Profiling usually means trying to understand application resource usage patterns by answering questions such as: "How
74%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
" and "increased," suddenly things don't sound so cozy. Why should an administrator settle for a normal (poor) configuration when they can implement an increased (good) protection requirement? If an incident occurs
74%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
? What kernel modules are loaded? What, if any, errors occur (and when)? The answers to these questions allow you to recognize when things don't seem quite right with the systems (events) that "normal" log
74%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
. For example, ephemeral session data is thrown away most of the time, but storing input from a user into an application that isn't written to a database might suit Amazon S3 [11] or sophisticated, redundant, off
74%
Data Compression as a CPU Benchmark
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Lucy Baldwin, 123RF.com
. A Universal Algorithm for Sequential Data Compression. IEEE Transactions on Information Theory, May 1977, 23:3 7-Zip CPU benchmark library: https://www.7-cpu.com/ Apple M1 7z benchmark results: https
74%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
on the server, which is probably one of the reasons Cockpit replaced virt-manager in Fedora, RHEL, and CentOS [7]. In the Pod Wherever you find virtual machines, you normally don't have to look hard to find
74%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
, but also acts as a small intrusion detection system. The tool is licensed under the liberal GNU GPLv3 license, which also allows free use in the enterprise. AFICK only requires Perl v5.10 or newer

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice