Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 199 Next »

8%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
: Monitored hosts send metrics to Riemann, and they assess their status themselves, rather than leaving this decision to a central instance [2]. In addition to the server, which is implemented in Clojure
8%
Writing SELinux modules
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Amy Walters, 123RF.com
The modules are available in a policy store below /var/lib/selinux/targeted/active/modules / (as of libselinux version 2.4). On older systems, they resided below /etc
8%
Many approaches help secure a web server
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © alexwhite, 123RF.com
the potential for optimization. A standard Let's Encrypt certificate has a key length of 2,048 bits and uses SHA256/RSA as the signature algorithm. Without any further changes to the parameters
8%
Identity and access management with Authelia
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Gordon Bussiek, Fotolia.com
-based systems that comply with the FIDO2 WebAuthn standard (Yubikey USB sticks). Push messages require users to have the Duo Push app by Cisco on their smartphones. After successfully logging in, Authelia
8%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
resource requirements. Although Apache is still king of the hill, approximately 30 percent of the top 10,000 websites already benefit from Nginx [2] (Figure 1
8%
The simpler alternative to cron: Whenjobs
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© stillfx, 133RF.com
since been developed, such as fcron [1] and anacron [2], the principle itself has barely changed. Red Hat programmer Richard W.M. Jones has now broken with tradition and come up with a new cron
8%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
in Figure 2, it lists all the factors that have been checked, along with a checkmark for passed or an X for failed. Figure 2: A detailed view of all factors
8%
All for Admins
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
. Farther in, we'll show you the OCFS2 filesystem for Oracle clusters. We'll also look at some virtualization tools, including Microsoft's vm2008 and OpenVZ – a container-based virtualization alternative
8%
AI/ML Tool Usage Increased 3000% in 2024, Says Zscaler Report
27.03.2025
Home »  News  » 
 
. ChatGPT accounted for nearly half (45.2%) of all AI/ML transactions. A total of 3624TB of data was transferred by AI/ML applications. The top five countries generating the most AI/ML transactions
8%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
cryptography (ECC). For symmetric encryption techniques such as AES, the quantum algorithm known as Grover's algorithm [2] halves the effective key length, thus requiring longer keys to maintain security

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice