Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (475)
  • Article (139)
  • News (41)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 Next »

43%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, for example, the waste of storage space and energy and the unnecessary effect on service life when writing to SSDs. When you transfer 1MB to an SSD, the drives actually writes considerably more data
43%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
. At least in this scenario the drive would give the operating system correct usage figures. A situation in which 50 percent of the drive's space is still available according to df, but the drive is actually
43%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
to connect to an outside DNS will connect to your local DNS server instead, and the computer will believe it is actually talking to the external server. A variant of these rules can be used to force HTTP
43%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
should be of a temporary nature for situations in which someone assumes the responsibilities of another; otherwise, the risk is that someone assigned temporary privileges actually keeps them forever
43%
AWS Elastic Beanstalk
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Aleksandra Glustsenko, 123RF.com
spun up his first AWS instance, he's been trying out new services and finding ways of getting more out of hardware, without actually owning any of it.
43%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
sites and the Teredo server, which then initiates the connection. After the connection is opened, the actual communication is routed directly between the two peers; the Teredo server only helps to set up
43%
Angular 2 client-side TypeScript framework
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
.ts (Listing 6) files. Listing 4 app/app.component.ts 01 // The component replaces the directive with the actual application, 02 import { Component, OnInit } from '@angular
43%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
of generating them on its own. If the computer on which you generated the keys is lost (which actually happened during my tests) and you have no copy of the public keys, the keys in the Nitrokey will be, for all
43%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
.g., by updating the virus signatures). A change of authorization (CoA) can then be used to change the restricted access to the actual access required. This CoA is sent by ISE to the active network component
43%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
that indicates from which portion of memory the processor is actually executing, as well as all of the data structures used during software execution. In the case of the operating system, this dynamic state

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice