Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (173)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 Next »

9%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
by 100 – for example, SLI (%)=(Positive events/Valid events) x 100. The classic SLI values are availability or latency, of which you do not want to exceed a certain limit. You can define SLOs
9%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
environment outside of the maker scene. Infos Espressif MCUs: https://www.linuxpromagazine.com/content/search?SearchText=ESP8266&x=0&y=0 Azure Sphere: https
9%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
on US financial institutions last year, the offenders achieved 20 times the effect of ordinary desktop botnets with a handful of servers. This trend exacerbated brute force attacks on WordPress sites
9%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
://raw.githubusercontent.com/duy13/vDDoS-Protection/master/latest.sh chmod +x latest.sh ./latest.sh All components are then available under /vddos on the local filesystem. In the best open source manner, the developers of vDDoS do
9%
Ralph, the open asset management tool
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sebastian Duda, 123RF.com
and Support. The forms are similar to those for creating assets. A special Windows agent named Don Pedro [4] is available for discovering Windows-based systems. It only requires an installed .NET 2.0
9%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
python-pubsub/samples/snippets python3 publisher.py demo create demo python3 subscriber.py demo create demo demo python3 publisher.py demo publish demo python3 subscriber.py demo receive demo 20 echo
9%
The light-footed Hiawatha web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Olexandr Moroz, 123RF.com
rewriting logic, for this purpose. Therefore, Hiawatha is perfectly suited to running Web 2.0 applications like WordPress, and because the web server has a complete transport layer security (TLS
9%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
, multiple in/multiple out; MU, multiuser; SU, single user; DL, downlink; UL, uplink. In a 4x4 multiple in/multiple out (MIMO) environment, WiFi 6 devices achieve a maximum total capacity of 14Gbps
9%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 falls between the switch and the number of threads.) Both the compression and decompression capabilities should be multithreaded. pzstd The parallel version of zstd  is pzstd . On my Ubuntu 20.04 system, pzstd  was
9%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
). Figure 1: Articulated as a mathematical formula, Risk = Threat x Vulnerability x Cost of Asset. Clear Guidance VA activities must have acceptance from the highest levels of an organization

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice