Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (943)
  • Article (274)
  • News (116)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 134 Next »

26%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
from serial CPU logic to CPU instructions operating on multiple data (such as AVX [6]) or a GPU's finer grained parallelism. Many strategies are liable to backfire when switching the underlying choices
26%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
M 12345 5 36 F 12346 6 34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
26%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
.0.0.0:12321 0.0.0.0:* LISTEN 764/stunnel4 tcp6 0 0 :::22 :::* LISTEN 676/sshd Another way to check whether Hiawatha is working
26%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
database service built for the cloud specifically to combine the benefits of the relational database structure with non-relational horizontal scale. First things first: Create the Dockerfile in Listing 6
26%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
are available to let administrators manage jails on the host system [6]. Here's a brief look: jail [-i] [-l -u | -U ] : Starts a jail
26%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
Warp has an anti-virus solution based on the Kaspersky engine (Figure 6). Microsoft offers built-in anti-virus protection as of Exchange Server 2013. Figure 6
26%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
, simple bars, or histograms. Conky normally writes its output directly to the desktop – more specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate
26%
Linux for Windows Admins: Samba Shuffle
18.09.2012
Home »  Articles  » 
 
. Figure 5: Mapping a shared Linux folder from Windows. Select the share and then click OK to map the drive. In Figure 6, you see that the remote share has been mapped and opened on the Windows system
26%
Mobile PC Monitor
20.02.2012
Home »  Articles  » 
 
6). Figure 6: Setting notification preferences for system performance thresholds. I left the … processor usage is below selection unchecked
26%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
="/etc/portsentry/portsentry.blocked.atcp"; banudp="/etc/portsentry/portsentry.blocked.audp"; # TCP tcp=`tail -n1 $bantcp | awk '{ print $6 }' | cut -d / -f 2`; if [ `echo $tcp | grep '123.45.67.' ` ] || [ `echo $tcp | grep '89

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice