Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (753)
  • Article (245)
  • News (24)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 103 Next »

26%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue
26%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
an alternative that has more security. SSHFS Filesystem in Userspace (FUSE) [3] offer several attractive features. Such filesystems are easy to code because they are in user space (have you tried getting
26%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
-node setups. Both MicroK8s and K3s use Hostpath in the basic installation. Hostpath can do little more than create and delete file-based PVs. Also, the driver cannot control or limit the memory quota. Nothing
26%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
the data that was gathered with this command: ossiot "mpirun –np 2 ./sweep3d.mpi" In Figure 6, I present an example of the event-by-event list view using the GUI, when the Event List EL icon is selected
26%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
m0.008s Line 8 of the backtrace in Listing 6 shows that the issue is caused by the file permissions: The Nagios user wants to write the webrat.log file but does not have the required permissions ... 3
26%
Bpfilter offers a new approach to packet filtering in Linux
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © alphaspirit, 123RF.com
"netfilter and iptable.") When the development of netfilter began at the end of the 1990s, most households still used 56K modems for online access. The ipchains packet filter, already available for Linux
26%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
, as standalone applications, or in the form of cloud services. For cloud applications in particular, these are typically platforms as a service (PaaS), from databases to artificial intelligence (AI). Today
26%
Hands-on Exchange rights management
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Isaac Marzioli, 123RF.com
for the Set-RoleGroup cmdlet always overwrites the entire managed-by list for a role group. Figure 3: With PowerShell, you can assign management role group
26%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
 Parallel-NetCDF that uses MPI-IO underneath. The initial goal was to focus on older formats: CDF-1, the “classic” format primarily used for netCDF through version 3.5, and CDF-2, added in CDF-1 version 3.6.0 onward, which
26%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
. If you like, extended attributes add metadata to a file or directory, going beyond the definition of the inode. Many Linux filesystems can use extended attributes: ext2 ext3 ext4 JFS

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 103 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice