Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (898)
  • Article (272)
  • News (38)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 122 Next »

16%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
January 2012 through March 2012. According to the report, 6 million new malware samples were created in the first quarter of 2012. The announcement states that "Trojans set a new record as the preferred
16%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
PCM 48, 56, 64 G.723.1 MP-MLQ/ACELP 5.3, 6.3 H.728 LD-CELP 16 G.729 CS-ACELP 8 G.729 annex A CS-ACELP 8
16%
Live migration of virtual machines with KVM
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © SV-Luma, 123RF.com
(e.g., iSCSI, Fibre Channel), or you can stick with NFS. For example, NetApp Clustered ONTAP also offers support for pNFS, which newer Linux distributions such as Red Hat Enterprise Linux or CentOS  6
16%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
| sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- This command string correctly prepares the -Shellcode parameter value. When passed to -Shellcode without specifying a process ID, the Invoke
16%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
opening the file compromises the computer. The spread of malware or crimeware has not slowed down – on the contrary. Back in the early 1990s, the first tools that greatly facilitated the process
16%
Data center management with Ralph
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © ffzhang, 123RF.com
installing, make sure Python 3.6 is installed on your Ubuntu system. Ralph also requires an NGINX web server and stores its settings in the /etc/ralph directory. The debconf prompts help you configure
16%
Finding the fastest SD cards for the Raspberry Pi
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Lucy Baldwin, 123RF.com
Speed class 10 At least 10MBps of read/write speed UHS 1 Ultrahigh speed class 1 At least 10MBps (same as C10) UHS 3 Ultrahigh speed class 3 At least 30
16%
Exploring PowerDNS
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © ladyann, 123RF.com
and records DNSSEC support (as of 3.x) Web-based management options DNS data stored in plain text (BIND compatible) IPv4 and IPv6, UDP/TCP, 100% compliant [3] MySQL, Postgre
16%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
6E5F05A1B2C960C41655E3 2B15CBE Considering the aforementioned CA vulnerabilities, anyone who would like to switch to self-signed certificates will receive support from DANE SMTP once again
16%
Software-defined storage with LizardFS
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © larisa13, 123RF.com
FS. Ceph is primarily an object store – comparable to the Amazon S3 API – that can also provide block devices, and the CephFS POSIX-compliant filesystem is more of an overlay of the object store than

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 122 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice