Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌留痕优化【电报e1000】google收录优化.pin.0x20 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (88)
  • Article (37)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

79%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i kubeletctl pods --cidr 3.71.72.0/24 -i Figure 1: Scanning for nodes to see if they are vulnerable with an exposed kubelet
78%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
_web latest c100b674c0b5 13 months ago 19MB nginx alpine bf85f2b6bf52 13 months ago 15.5MB With the image ID in hand, you can inspect the image manifest: docker inspect bf85f2b6bf52
78%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
Network Coordination Centre (NCC) [4] is responsible for the European arena. In addition to ASNs, RIRs register the IP address spaces (prefixes) of their members. Well-known examples are the prefixes 8.8.8.0/24
78%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
.168.2.2" }, { "name": "domain-search", "data": "mydomain.example.com, example.com" }], "subnet4": [{ "subnet": "192.168.2.0/24", "pools": [{"pool":"192.168.2.1 - 192.168.2.50"}], "option-data": [{ "name
78%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
+ 18 + 21 + 24) + (3 x 27)]/35 = 14.66 minutes. That is to say, the first four requests take three minutes each, the second set of four requests takes six minutes each, and so on. Add three more machines
78%
Finding the fastest SD cards for the Raspberry Pi
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Lucy Baldwin, 123RF.com
was historically problematic for low-end SD cards. Run as iozone -e -I -a -s 100M -r 4k -i 0 -i 1 -i 2 [-f /path/to/file] with the iozone [9] benchmark. Figure
78%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
Avail Use% Mounted on 05 /dev/sda1 109G 17G 87G 16% / 06 tmpfs 16G 596K 16G 1% /dev/shm 07 /dev/md0 2.7T 192G 2.4T 8% /home 08 /dev/sdb1
78%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
08 # Network information 09 network --device=bond0 --bondslaves=ens1f0,ens1f1 --bondopts=mode=802.3ad,miimon-100 --bootproto=dhcp --activate 10 network --hostname=server.cloud.internal 11 network
78%
Wireshark
27.11.2011
Home »  Articles  » 
 
support for Python scripts and the ability to right-click the packet details in the packet list to add protocol fields. The release of Libpcap 1.0.0 added the ability to define the buffer size
78%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
Tweets around ISC 24 is from Jeff Hammond, speaking about rewriting code for GPUs: Hammond’s law: almost no one will rewrite their code for less than 2x and almost everyone will rewrite their code

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice