Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 113 Next »

10%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
-specific timeouts globally across the server or for individual virtual hosts. The following line tells Apache to wait a maximum of 10 seconds to receive header data; the limit is set at 30 seconds; and the wait
10%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
traces of a break-in, you can do so at your leisure in a virtual Android environment that comes with the SDK tools. A look at the backup options using adb help explains how you can back up and restore
10%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
, including building everything on standard hardware, taking advantage of virtualization, or using a hosted solution (shared, VPS, etc.) Other supernumerary private/public cloud environments include market
10%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
Shell cmdlets or scripts, you should practice and test with your local workstation. A virtual machine would be an even better sandbox in which to test. Never test on production systems. Now look at the Get
10%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
be addressed as if they were on a hard disk. This functionality is especially helpful in the context of virtualization because presenting a block device to KVM as a hard disk saves the virtualization a detour
10%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
[1] [2]. This type of malware is virtually undetectable without analyzing volatile memory. Much of the industry focus has been on developing memory analysis techniques for Windows operating systems
10%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
from Linux’s /proc/cpuinfo and /sys virtual filesystem isn’t necessarily easy for humans to read and can be different between various hardware platforms and versions of the Linux kernel. Listing 1
10%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
, and Unix, I’ll spin up a virtual machine (VM) or a decommissioned physical machine for my automation systems. Creating dedicated systems separates them from those in production. If you maintain your
10%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
virtually all aspects of the image. The man page is not very long, and it’s definitely worth a look at the various options. Any user can create an image of any part of their data they desire. However
10%
Setting up FreeNAS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Franck, 123RF.com
SCSI, SSH, rsync, and FTP/TFTP protocols Virtualization support with XenServer and VMware Replication Multiple RAID types supported ZFS Data protection Many backup options Disk encryption

« Previous 1 ... 70 71 72 73 74 75 76 77 78 79 80 81 82 83 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice