Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1295)
  • Article (344)
  • News (201)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 185 Next »

13%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
to Bitkom [1], Germany alone has more than 3,000 data centers with greater than 40kW of IT connection capacity and at least 10 server racks, as well as around 47,000 smaller IT installations, and the trend
13%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
allowing strong encryption under state control – with a third key, which would be deposited with the secret service. After that, Netscape published SSLv3 to fix at least the worst of the security problems
13%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f3c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e6c4e1f
13%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
of all evil" sums up this point of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
13%
Monitor Your Nodes with collectl
28.03.2012
Home »  HPC  »  Articles  » 
--------><----------Disks-----------><----------Network----------> #cpu sys inter ctxsw KBRead Reads KBWrit Writes KBIn PktIn KBOut PktOut 3 1 1421 2168 0 0 41000 90 0 2 0 0 3 2 1509 2198 64 2 49712
13%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
with AMD, IBM, and NVidia) submitted a specification to the Khronos Group, which promotes the OpenGL specification. Open Computing Language 1.0 (OpenCL) was released late in 2008 [3]. OpenCL now provides
13%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
 MiB L3 cache:                        128 MiB NUMA node0 CPU(s):               0-63 Vulnerability Itlb multihit:     Not affected Vulnerability L1tf:              Not affected Vulnerability
13%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
 catatonit conmon containernetworking-plugins crun golang-github-containers-common   golang-github-containers-image netavark passt podman 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Need to get 32.3 MB of archives. After this operation, 131 MB
13%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
libraries.) The latest Bro packages are included in source and binary form [3]. On CentOS, I download the Bro full install with: # wget https://www.bro.org/downloads/release/Bro-2.3.1-Linux-x86_64.rpm Next
13%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
], and MongoDB 3.6 [3]. If not already present, installing Java (as root or using sudo) before Elasticsearch and MongoDB is recommended: yum install java-1.8.0-openjdk-headless.x86_64 You should remain root

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 185 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice