Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (133)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

9%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX,10 Fierce [2], written
9%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
combinations are supported: ShadowProtect 4.0.1: Oracle VirtualBox 3.1.0--3.2.6 ShadowProtect 4.0.5: Oracle VirtualBox 3.1.0--3.2.12 ShadowProtect 4.1: Oracle VirtualBox 3.1.0--4.0.4 Shadow
9%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
center and campus environments. Dell also released Open Manage Network Manager 5.0 (OMNM), which provides a single console for all network management functions of Dell networking platforms in branch
9%
Open source remote access to Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Nikolay Okhitin, Fotolia
/raddb/server file: vi /etc/raddb/server Next, below the line 127.0.0.1 secret 1 add routableIPaddress shared_secret 1 substituting the IP address of the WiKID server. Configuring the WiKID Token
9%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
is only defined to increase the number of potential hashes, this is not a security issue. Security Class Phpass works with PHP 3.0.18 or newer. If you want to make sure that Phpass will use Bcrypt as its
9%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
, improving on the concept by fixing [12] several problems in Jupyter's design. Whereas Jupyter can serve as an interface to many different languages (the name is a mashup of Julia, Python, and R, its original
9%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
server also requires Sun Java SDK version 1.6.0. Some distributions keep this package in an external or special repository. On Debian, you need to enable the non-free package source; on Ubuntu 10.04, you
9%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
on YouTube (https://www.youtube.com/watch?v=GfH4QL4VqJ0), features accounts from Guido van Rossum, Travis Oliphant, Barry Warsaw, and many others. It tells "the story of Python's rise, its community
9%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
/ceph/$name.keyring 04 [mon] 05 mon data = /srv/mon.$id 06 [mds] 07 [osd] 08 osd data = /srv/osd.$id 09 osd journal = /srv/osd.$id.journal 10 osd journal size = 1000 11 [mon.a] 12 host = alice 13 mon
9%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
classifies each pair into self-defined optimization categories. Category 0 means it cannot be optimized. Category 1 means it can easily be optimized. Category 2 means that although one or more other

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice