Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (638)
  • Article (186)
  • News (131)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 96 Next »

17%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
has well over 100 such transformations and 15 entity types. Maltego's graphical user interface helps you visualize the relationships between different elements that you have not previously seen, even
17%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
://www.envoyproxy.io/ APIs: https://www.envoyproxy.io/docs/envoy/v1.15.0/api/api The Author Martin Gerhard Loschwitz is Senior Cloud Architect at Drei Austria, where he mainly works with OpenStack, Ceph
17%
Fixing Ceph performance problems
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kritiya Sumpun, 123RF.com
, but the problem returns regularly. During the periods when the problem does not exist, writes to the volumes of the VMs deliver a passable 1.5GBps. The monitoring systems I used did indeed display the slow writes
17%
Dig Deep into Kubernetes with StatusBay
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Noel Powell, Fotolia.com
1). The metrics, alerting, and reporting integration docs can be found online [15]. As you can see, almost all the usual suspects are present, making StatusBay an even more attractive addition to any
17%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
Startup(); 15 }); Figure 2: SSL-encrypted traffic with a trusted certificate is a must-have. Much like site bindings on the IIS, the port listened
17%
High-performance backup strategies
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Kian Hwi Lim, 123RF.com
. For example, if you create an incremental backup for 14 days, the change compared with day 14 must be saved on day 15, and the data from day 1 must be moved to the file for day 2. Depending on the size
17%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
-group 13 neighbor LAB remote-as 65540 14 neighbor LAB password t0ps3cr3t 15 neighbor 192.0.2.0 peer-group LAB 16 ... 17 address-family ipv4 unicast network 192.168.2.2/32 18 exit
17%
Read-only file compression with SquashFS
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © modella, 123RF.com
) Directory table size 2199 bytes (2.15 Kbytes) 63.72% of uncompressed directory table size (3451 bytes) Xattr table size 54 bytes (0.05 Kbytes) 100.00% of uncompressed xattr table size (54
17%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
as a cluster with up to 15 Read Replicas. If the primary instance fails, one of the replicas is automatically appointed the new primary instance. If no Read Replica is configured, a new instance of the DB
17%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
with password length. From 15 to 20 characters, cracking is no longer possible in a finite amount of time – or at least not with today's technology. However, length alone is not helpful if a password

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice