Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (716)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 84 Next »

7%
Rancher manages lean Kubernetes workloads
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sebastian Duda, 123RF.com
://get.k3s.io | sh -s - server --datastore-endpoint="mysql://rancher:secret@tcp(10.42.0.1:3306)/rancher" Of course, the command specified here will only work if the system has direct access to the Internet ... The Rancher lightweight alternative to Red Hat's OpenShift gives admins a helping hand when entering the world of Kubernetes, but with major differences in architecture.
7%
Working with Microsoft Azure RemoteApp
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © bloomua, 123RF.com
at the range of functions before addressing the specific setup. Cloud or Hybrid The technical basis is the Remote Desktop Session Host role service from Windows Server 2012 R2. Users access the applications
7%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
Since the Linux kernel 2.6.20 release in February 2007, the Kernel-Based Virtual Machine, KVM [1], has made much progress in its mission to oust other virtualization solutions from the market. KVM
7%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
are usually called "endpoints." Examples of endpoints include laptops, thin clients, smartphones, tablets, and Internet of Things (IoT) devices, but a server could also qualify as an endpoint. Securing endpoint
7%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
, if you notice – from communication with a known command-and-control server on the Internet – that a system is compromised and infected with malware, you can quickly identify any other unusual communication
7%
Modern MySQL Forks and Patches
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Dmitry Karasew, 123RF.com
SQL). The patches can be grouped into three categories: (1) reporting enhancements, (2) functional enhancements of the MySQL kernel and database engines, and (3) performance optimizations. In most cases
7%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
as well as encrypting it, but I like to keep these two steps separate. Listing 2 Compress and Encrypt a File $ gzip -9 hpc_001.html $ ls -s total 11084 11032 Flying_Beyond_the_Stall.pdf 28
7%
Can your web server be toppled with a single command?
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Almagami, 123RF.com
of a test which was run on www.domain.com are shown in Figure 2. Notice that I stopped this test between two and three seconds, so it had no effect whatsoever on the test subject's website. The results would ... The common Apache benchmarking tool known as ab can carry off a highly effective DoS attack if you're not prepared.
7%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
Ridge National Laboratory, and it features 560,640 processors, including 261,632 NVidia K20x accelerator cores. Sequoia, an IBM BlueGene/Q system, now occupies the No. 2 spot on the list, with 16
7%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
to the supernode on the Internet, which is operated by the ntop developers. The external support provider in turn uses n2n to connect to the supernode and can then access the ntopng installation of the person

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice