Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (770)
  • Article (213)
  • News (112)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 110 Next »

9%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
is a string like "1, 10, 12, 15, 2, 21, 3, …" and not the ascending order of the values. Exporting the data into another program and anchoring the desired sorting directly in the query by adjusting
9%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
" nodeInfo: architecture: amd64 containerRuntimeVersion: docker://1.12.6 kernelVersion: 4.4.0-72-generic osImage: Ubuntu 14.04.5 LTS GPU Scheduling Graphics processors do most
9%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
attached (Figure 12). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
9%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
, the Auth component first creates a valid X.509 certificate with restricted validity (usually 12 hours) and sends it back to the client. The second phase of establishing the connection then follows. Teleport
9%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Jack Hunter on Unsplash
benefits graphically intensive applications, but also those that require GPUs for machine learning (ML) or artificial intelligence (AI) use cases. Microsoft has ported the DirectX 12 interface to Linux
9%
Protecting the production environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Intricate Explorer on Unsplash
ensure => installed, 10 before => File[$config_file], 11 } 12 file { $config_file: 13 ensure => file, 14 content => template('apache/httpd.conf'), 15 notify => Service[$service_name], 16 } 17
9%
PostgreSQL 9.5 – What's new; what's better?
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Sergey Nivens, 123RF.com
_expires) 10 WHERE (user_id, subscription_type) = (in_user_id, in_subscription_type); 11 EXIT upsert WHEN FOUND; 12 BEGIN 13 INSERT INTO subscriptions (user_id, subscription_type, started, expires
9%
MariaDB MaxScale: A smart proxy for MySQL
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
_options=synced 08 servers=backend1, [...] 09 user=maxscale 10 passwd=secret 11 12 [Galera Listener] 13 type=listener 14 service=Galera Router 15 protocol=MySQLClient 16 address=10.42.0.1 17 port=3306 18 19 [Galera
9%
New storage classes for Amazon S3
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © stillfix, 123RF.com
) ≥3 Glacier Deep Archive Data archiving for barely used data with a recovery time of 12 hours 99.999999999 99.99 (after restore) ≥3 RRS (no longer
9%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
MAXJPEwna184sRuU6QGYWnccTAyJhpzYQ+AsfK8eZVYS 12 iA2g8G24ZIvMrzOp6KQdx0XET6/QIO5xD7B0QH9YNXatVsXtzce+9Q9X 13 klmc78oKRKrVw969aEX91kjRXf6pjRXckJxXdXetxzuL6/E4bMKjQCGX 14 yJI20TGx Confirming the keys follows

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 110 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice