Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente" ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (934)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 133 Next »

15%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
. Git-annex Linux Magazine already featured the file synchronization software git-annex [6] just over a year ago [7]. The main advantage of git-annex compared with a plain vanilla Git solution
15%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
of the stack in the Application Layer (OSI model Layer 7) [6]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application
15%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
6th Gen to 10th Gen Core CPUs and a number of Xeon processors. Some Intel-based systems have begun shipping (since Jan 2022) with the new microcode for both Intel Core and Xeon processors.
15%
Tech News
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
 
significantly more resources, which means that the scope of this attack is quite remarkable. According to Cloudflare, the botnet used for the attack consisted of 6,000 unique bots from 1,300 different networks
15%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
this problem. File I/O can therefore be a highly relevant factor for program optimization. The libiotrace [4] library uses LD_PRELOAD to gather data about POSIX [5] and MPI [6] file I/O functions. Although other
15%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
not allowed RSA keys that use SHA-1 for signing since version 8.8 [6]. If you still want to use the RSA algorithm for the host key of an SSH server, it must be used together with a hash algorithm from the SHA
15%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
on an asymmetric Diffie-Hellmann key exchange [6], but unlike PKINIT, no additional infrastructure in the form of a public key infrastructure (PKI) is required. Since MIT Kerberos version 1.14, the library has also
15%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
the following command with swap turned off (swapoff -a) and watch the fireworks: stress-ng --brk 2 --stack 2 --bigheap 2 Colin has presented his work at several Linux Foundation events, and slides [6
15%
Pattern matching dispute in Python 3.10
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Steve Harvey on Unsplash
to receive such a match expression. The Python enhancement proposal (PEP) 634 [4] describes the implementation. More information about the plans can be found in PEP 635 [5] and PEP 636 [6]. How pattern
15%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
Emergency Readiness Team (US-CERT), for example, recommends the 3-2-1 backup principle [6]: three copies of the data, one production copy, and two backups, divided between two different media (e.g., hard

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice