Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (93)
  • Article (28)
  • News (10)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

14%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
the approach introduced by Canonical with Ubuntu 12.10, in which only the bootloaders, but not the kernel, are signed. Compared with Canonical's approach, which only ensures that Ubuntu will start on Windows 8
14%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
_servers: - 10.42.0.10 - 10.42.0.11 dhcp_pxeboot_server: 10.42.0.12 The subnet must be a subrange of the subnet where the VM with the infrastructure services itself is located. However, when
14%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
Kingsbury and his team recommend proactive monitoring with Riemann [1], which allows you to predict imminent failures and initiate countermeasures in a timely manner. The program, first published in 2012
14%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
by default (simply copy in the SSHD: line if your file doesn't exist). Listing 1 Permissions for Key tcpd Files -rw-r--r-- 1 root root 351 Nov 3 2012 /etc/hosts.deny -rw-r--r-- 1 root root 348
14%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
Duty instance (or detector) is enabled [4]. Listing 1 Policy to Enable GuardDuty 01 { 02 "Version": "2012-10-17", 03 "Statement": [ 04 { 05 "Effect": "Allow", 06 "Action": [ 07
14%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
servers and sysadmins. These levels of growth always sound absurd when peddled by analysts. Cisco predicts 50 billion devices by 2020 compared with 12.5 billion in 2012. To get some intuition about
14%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
the /dev/ pmem pseudodevice, which you can leverage to dump the memory content with dd . Figure 1 shows the complete process for an Ubuntu 12.04.1 LTS system
14%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
about the Raspberry Pi (Pi) that was introduced in 2012. Hobbyists, including me, got excited by the prospect of having a very low power SBC that runs Linux and is inexpensive on their desk. The Pi had
14%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Server 2012 R2 and 2016. Figure 1: With PowerShell, you can check whether IIS is installed on a server. Managing the Web Server and Sites Once IIS
14%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
The Quick UDP Internet Connections (QUIC) protocol [1] originated in 2012 as a Google project led by Jim Roskind to improve security and performance over TCP. The protocol made the leap to four

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice