Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (720)
  • Article (211)
  • News (112)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 105 Next »

14%
Central logging for Kubernetes users
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © zlajo, 123RF.com
labels for certain values: An http_return_codes metric could have a value label, which in turn takes tags of 200, 403, 404, and so on. Ultimately, labels help admins keep the total number of all metrics
14%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
with approximately 8,200 cores each, and six newer islands with 14,300 cores each. It achieves a speed of around 6 petaFLOPS (10^15 floating-point operations per second). In total, almost 500TB of main memory
14%
Activate HTTP/2 on web servers
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Soloviova Liudmyla, 123RF.com
with the message: 10.0.0.1 - - [21/Dec/2015:05:46:30 -0500] "GET /tile-399.jpg HTTP/2.0" 200 846 "https://10.0.0.31/" ... Figure 2: A blue lightning bolt icon
14%
News for Admins
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
 
to the European Commission. Read more at SDxCentral: https://www.sdxcentral.com/articles/news/eu-invests-200m-in-quantum-technology-to-secure-communications-networks/2024/01/. NIST Identifies Main Types
14%
Azure Application Gateway load distribution tool
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © foodandmore, 123RF.com
, a health check sends regular requests to a user-specified URL and monitors whether or not the back-end instance sends the expected HTTP response (e.g., a status code of 200 or a specific character string
14%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
to be intercepted and manipulated. The client establishes a connection to mitmproxy and generates an HTTP CONNECT request. Mitmproxy responds with a 200 Connection Established message, simulating
14%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
servers and sysadmins. These levels of growth always sound absurd when peddled by analysts. Cisco predicts 50 billion devices by 2020 compared with 12.5 billion in 2012. To get some intuition about
14%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
14%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
Name ------- ------ ----- ----- ----- ------ -- ----------- 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 74 9 1464 2568 42 0.09 2172 armsvc 195 10 2380 2984 62
14%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
Control Manager on computer 'XENAPP0'. This operation might require other privileges. At line:1 char:12 + Get-Service <<<< -ComputerName XENAPP0 + CategoryInfo : NotSpecified: (:) [Get

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 105 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice