Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente" ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (929)
  • Article (270)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 132 Next »

16%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
in the Domain Name System and shows the IPv4 or IPv6 address to which they refer. Figure 1: A first call with just the domain of interest produces many
16%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
over the color for the bars (Figure 6). Figure 6: Histogram of the groups of readers as determined by cluster analysis. Visualizing Multiple
16%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
bottlenecks, not absolute speedup numbers for the whole codebase. Second, given more resources, you will usually process more data or do more work. Gustafson's law [6] provides an alternative formulation
16%
Updating Docker containers with Watchtower
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Alan on Unsplash
_SCHEDULE="0 0 */6 * * *" to the docker run command. As discussed earlier, if you use containers for which automatic updates are difficult or unreliable, you can also configure Watchtower simply to check
16%
Run applications in a containerized sandbox with Firejail
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Victor Zastolskiy, 123RF.com
then be propagated to sub-namespaces. The cgroups namespace supports abstracting control groups, namespaces, or both. The time namespace, which was only released in 2020 with kernel 5.6, cannot abstract real time
16%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
.1.3 Running hypervisor: QEMU 1.6.1 If access works, a few lines of Python are all you need to retrieve the desired information (Listing 2). The hypervisor hosts are defined in the hv array. In the following
16%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
. In general, the algorithm assigns data of an arbitrary length to a datum with a fixed length. Well-known examples are checksums with MD5  [6] or SHA-1 [7]. In the case of distributed data storage systems
16%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
. Git-annex Linux Magazine already featured the file synchronization software git-annex [6] just over a year ago [7]. The main advantage of git-annex compared with a plain vanilla Git solution
16%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
of the stack in the Application Layer (OSI model Layer 7) [6]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application
16%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
6th Gen to 10th Gen Core CPUs and a number of Xeon processors. Some Intel-based systems have begun shipping (since Jan 2022) with the new microcode for both Intel Core and Xeon processors.

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice