Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (534)
  • Article (144)
  • News (102)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 79 Next »

21%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
1048576000 sectors 13 Units = sectors of 1 * 512 = 512 bytes 14 Sector size (logical/physical): 512 bytes / 4096 bytes 15 I/O size (minimum/optimal): 4096 bytes / 4096 bytes 16 Disk identifier: 0x00000000 17
21%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
/ioutil" 09 "log" 10 ) 11 12 type Config struct { 13 Reviews map[string][]string 14 } 15 16 func main() { 17 yamlFile := "reviews.yaml" 18 data, err := ioutil.ReadFile(yamlFile) 19 if err != nil { 20
21%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
.org/ntopng/securing-ntopng-with-ssl-and-lets-encrypt/ The Author Thomas Zeller is an IT consultant and has been involved with IT security and open source for 15 years. He is the author and coauthor of OpenVPN Compact and Mind Mapping with Freemind . In real
21%
Red Hat Enterprise Linux 8 pre-series test
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image Photo by Filip Mroz on Unsplash
For more than 15 years I have been a Debian developer, so I am used to a good deal of teasing about "Debian Stale," a corruption of the name of the Debian Stable branch. However, if you look
21%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
of example attacks [15] got me thinking about the effectiveness of social engineering. Consider for a moment a real-life occurrence of one of the examples [16] listed on that page: "A phishing attack
21%
GitLab for DevOps teams
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © maroti, 123RF.com
[15]. Additional open source tools are used in container scanning. The CoreOS project Clair [16] collects information about app and Docker container vulnerabilities in its database. With the use
21%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
to jump to the next table to manipulate packages for further processing. The OpenFlow protocol comes in several editions. The current version is 1.5 (standard). Version 1.3 is still quite common, as is 1
21%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
/security-best-practices/best-practices-for-securing-active-directory Security Compliance Manager: https://www.microsoft.com/en-us/download/details.aspx?id=53353 Security Compliance Manager (retired): https://blogs.technet.microsoft.com/secguide/2017/06/15/security
21%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
times. In general, data carriers with 15,000rpm are recommended. Here, 2.5-inch enterprise disks often offer shorter access times than their 3.5-inch counterparts. In general, Microsoft recommends the use
21%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
in conventional setups. For example, given a cloud of 2,000 physical nodes, with 200 values per system to be collected every 15 seconds, you would net 1,600,000 measured values per minute, or a fairly significant

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 79 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice