Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (469)
  • Article (155)
  • News (17)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 Next »

17%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
to Virtualization.'' Alternatives to Virtualization According to one very nicely written page [3], KVM will still work without the hardware extensions, but it will be much slower. It is also possible
17%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
_64 3/4 19 Verifying : bzip2-1.0.6-13.el7.x86_64 4/4 20 21 Installed: 22 mssql-server.x86_64 0:14.0.3026.27-2 23 24 Dependency
17%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
and system owners, which makes it easy to provide protection against exploits. Brute force attacks on SSH servers, the lack of encryption in communications, and distributed denial of service (DDoS
17%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
, the Virtual Machine Manager can create a snapshot, which appropriate tools then take apart [2] [3]. A bare metal Linux presents forensic experts with greater challenges: Every change to the system also changes
17%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.S. National Institute of Standards and Technology (NIST). According to the guide
17%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
Stax Insights [3]. The former enables flexible scalability in Cassandra clusters and consumption-based billing supported by the stability and performance enhancements of DataStax Enterprise, which monitors
17%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
Description Source Statistics Analyze and model data using statistics and machine learning [http://www.mathworks.com/products/statistics/?s_cid=sol_des_sub2_relprod3_statistics
17%
Let the editor wars begin!
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Kirill Makarov, 123RF.com
for another editor. ex Ex [1] was written by Bill Joy [2] in 1976 as something of a replacement for the original *nix editor named ed [3] (ed was developed in 1969). Bill Joy modified a development of ed
17%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [3] that automatically expire. You can
17%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
examples created a slider in the Pluto notebook (Figure 3) with @bind x Slider(1:10) In HTML, the closest equivalent is: However, the two examples

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice