Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 148 Next »

13%
Review: Accelerator card by OCZ for ESX server
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© gortan123, 123RF.com
called VXL. The Windows application (which, incidentally, can also run on a virtual machine) and the VXL virtual machine need access to a separate iSCSI network that connects the storage to be accelerated
13%
Virtualization with Microsoft Hyper-V
29.06.2011
Home »  CloudAge  »  Articles  » 
 
with cluster shared volumes and with SANs or iSCSI solutions. If you use a separate network for cluster communications, make sure that the client for Microsoft networks and file and printer sharing for Microsoft
13%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
options, including distributed and global disk storage, archival storage, and two classes of flash storage. The system provides both a high-bandwidth, low-latency, quad-data-rate InfiniBand network as well
13%
Tech News
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
 
significantly more resources, which means that the scope of this attack is quite remarkable. According to Cloudflare, the botnet used for the attack consisted of 6,000 unique bots from 1,300 different networks
13%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
in different classes according to the subsystems they load the most – CPU, memory, I/O, network, and so on. All tests in the class can be run in parallel or, perhaps more usefully, sequentially
13%
How to query sensors for helpful metrics
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by patricia serna on Unsplash
need a server with a network bridge and a Podman network of the Bridge [3] type. You will find various how-tos online to help you create a bridged container network of the macvlan type. However, if you
13%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
resources a container can use. At the same time, the container itself only sees certain processes and network functions. Although an attacker will find it difficult to interact with the host's kernel from
13%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
Could Allow Login with Expired Passwords Cisco's Talos threat intelligence service has uncovered a flaw in the Network Time Protocol (NTP) authentication process that lets an attacker force the NTP
13%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
/Locky.A Encrypt and Blackmail The name "Locky" already suggests its function. The ransomware encrypts files on the affected computer, on network drives, and even in the cloud, thanks to synchronization. These data
13%
Targeted attacks on companies
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Ildar Galeev, 123RF.com
network and to work their way up to the company's genuinely worthwhile targets through the infected mobile device. The name of this method is derived from the animal world: Where animals in drier regions

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice