Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1346)
  • Article (336)
  • News (252)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 194 Next »

10%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
/ceph/$name.keyring 04 [mon] 05 mon data = /srv/mon.$id 06 [mds] 07 [osd] 08 osd data = /srv/osd.$id 09 osd journal = /srv/osd.$id.journal 10 osd journal size = 1000 11 [mon.a] 12 host = alice 13 mon
10%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
10%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
08 integer :: counter 09 integer :: counter_limit 10 integer :: ierr 11 12 type(rec) :: my_record 13 14 counter_limit = 2000 15 16 ierr = -1 17 open(unit=8,file
10%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
='y' clause along with the create table statement: mysql> create table testTB (c1 INT) encryption='y'; mysql> alter table testTB encryption='y'; Query OK, 1 row affected (0.33 sec) Records: 1 Duplicates: 0
10%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
 Recheck: 978 11    ->  Bitmap Index Scan on mail_msg_idx  (cost=0.00..128.03 rows=4 width=0) 12    (actual time=34.925..34.925 rows=1650 loops=1) 13          Index Cond: (msg ~ '(updatable|views)'::text) 14
10%
A Substitute for cron
18.03.2013
Home »  Articles  » 
 
the matching compiler and a few packages. You can install these with the following command, for example, on Ubuntu 12.10: sudo apt-get install ocaml ocaml-findlib libcalendar-ocaml libcalendar-ocaml-dev camlp4
10%
To syslog or not to syslog
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Zsolt Biczo, 123RF.com
the output accordingly with --type=service. All told, systemd currently provides 12 different unit types. However, how do you know which fields belong to a log message? In this case, the journald -o verbose
10%
News for Admins
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
 
has a 1.2 GHz quad-core processor, 1 Gb of RAM and up to 32 Gb eMMC storage. Compute modules sell for approximately $35 USD each. Constantin Alexandrov, founder of Turing Machines Inc., says
10%
Logical Bombs for Fun and Benchmarking
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
of the Linux kernel's OOM logic [9] that went mainstream when Ubuntu 12.04 shipped version 3.2 of the Linux kernel. Processes are assigned a badness score [10], primarily based on their memory footprint
10%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
to recover the encrypted files. Once the encryption process is complete, Locky stores a ransom demand and also sets up a desktop background with a ransom demand. It requires the victim to pay a ransom of 0

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 194 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice