Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 83 Next »

7%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
on the June 2020 list at 13,400 TFLOPS. The previous system, Summit, achieved only 2,925.75 TFLOPS. Fugaku’s results went up a little on the next list (November 2020), at almost 5.5 times faster than Summit
7%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
If you want to evaluate your logfiles, you are likely to turn to a log viewing tool. In the simplest case, log viewers show you the data in tabular form; more sophisticated programs at least give
7%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
-technical conditions for DevOps [8] can be described as organizational culture. This includes not seeking scapegoats in case of errors and problems (Figure 2). If the developers put the blame on the Linux admins, who
7%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
is a freelance IT consultant and has been working in IT for more than 20 years. In addition, he writes hands-on books and papers on Windows and other Microsoft topics. Online you can meet him on http://thomasjoos.spaces.live.com.
7%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
HQifQ.gyjpaChSSdpq2WQqsFB81noKQShT19XkoO7620t70w8GVSRt3BhY2UiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5[snip ...]   $ kubectl describe po kube-apiserver-minikube -n kube-system $ kubeautoanalyzer -s https://192.168.39.207:8443 -t
7%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
. In this use case, a complete virtual server is automatically installed, and administrators on the network have to take care of it. If you create an Azure SQL database, you also need a SQL server in the cloud
7%
Software-defined storage with LizardFS
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © larisa13, 123RF.com
/download/ Raft algorithm project site: https://raft.github.io Documentation: https://lizardfs.com/41-2/ Skytechnology announces uRaft release: https://github.com/lizardfs/lizardfs/issues/389
7%
Policy-based DNS in Windows Server 2016
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © mikiel, 123RF.com
2 Adding Records to Zone Scopes > Add-DnsServerResourceRecordA -Name "www" -ZoneName "contoso.com" -ZoneScope "DE" -IPv4Address "10.0.101.99" > Add-DnsServerResourceRecordA -Name "www" -Zone
7%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... A distributed denial of service (DDoS) attack on Spamhaus (Figure 1), a provider of real-time DNS blacklists, affected a part of the Internet last March with a flood of data reported to reach 300 ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, which allows them to work around conventional defense mechanisms. We explain how a DDoS attack
7%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
also acts as a USB-to-UART/SPI/I2C adapter and supports Bluetooth spamming. This low-energy denial-of-service (DoS) attack can be used to crash iPhones and iPads in particular. Devices with iOS 17.2

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice