Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: server 10s files%2server. started inaccessible 04 windows 7 00s 04 for%2px ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (824)
  • Article (227)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 106 Next »

14%
Tech News:
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
openSUSE Comes to Windows 10 Ubuntu is the officially supported version of Linux to run inside Windows, using the Windows Subsystem for Linux (WSL) technology; however, engineers have discovered
14%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
email, URLs, files, and IP addresses, in terms of reputation and potential malware, and identifies botnets and their control server (Command and Control sites) 24/7. The new version of Sophos UTM
14%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
into position between the client and the server. Getting Started Mitmproxy is available for Linux, macOS, and Windows. Standalone binaries are available for Windows and Linux, with distribution
14%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © 123RF.com
. Content is algorithmically directing a more efficient infrastructure for delivering it. It is more efficient than traversing the same network to the same old web server and downloading files. The CDN
14%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
and email. Optional 24/7 phone support is available. They also can provide private clusters, including Windows HPC systems, contracts, custom SLAs, and ITAR-compliant networks. SGI SGI’s cloud computing
14%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
of a virtual machine, you can easily try this implementation with an Apache web server. For example, if you are using Debian, first install the Apache server: sudo apt-get update sudo apt-get install apache2
14%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
of functions comparable to those of its NFS counterpart, but using the SMB protocol instead of NFS. This option is interesting in environments with existing Windows file servers. The GlusterFS [6] distributed
14%
Sharing Data with SSHFS
23.04.2014
Home »  HPC  »  Articles  » 
CLUSTERBUFFER2]$ ls -s total 0 It’s a good idea to have a mountpoint (directory) that is empty, because when the remote filesystem is mounted, it will “cover up” any files in the directory. Mounting
14%
Alternatives to Google Analytics
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Vasilii Shestakov, 123RF.com
a wildcard. Then, you enter the log file format: where LogFormat = 4 means an Apache log file. If you are using AWStats on IIS on Windows, the value for LogFormat is 2. In the next line, enter the domain name
14%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
:aws:iam:::policy/IAM_Policy --policy-document file://privesc.json --set-as-default { "PolicyVersion": { "VersionId": "v2", "IsDefaultVersion": true, "CreateDate": "2021-10-14T09:52:55+00:00" } } By checking the policy ... Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice