Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (106)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 134 Next »

25%
Tuning Ansible
09.05.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
, and by default, it simply uses an SSH daemon that already exists on my destination client machine(s). Table 1 : The Server Side of Ansible on Ubuntu 16.04     ansible python
25%
Real-time monitoring with Graphite
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkov, 123RF.com
on the interaction of three software components: (1) Carbon queries the various time series data; (2) Whisper, the database library, handles the task of storing the data; and (3) Graphite-Web provides the user
25%
A decentralized communication platform
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Mipan, Fotolia.com
with Jami's search function – but this does not require providing any personal information. Jami is available for Linux, macOS, and Windows; smartphones with Android [2] and iOS [3]; and TVs with Android TV
25%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
-passphrase Several parameters in this file define the repository layout [2] [3], as follows: Origin: An optional field that describes the origin of the repository. You can select a free line of text. Label
25%
Network monitoring for Windows
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© spectral, 123RF.com
Instrumentation (WMI), the Simple Network Management Protocol (SNMP), and, in the case of a compatible router (e.g., Cisco), NetFlow or sFlow. In the current version, you don't need to license NetFlow sensors
25%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
where there are many large file attachments. In Exchange, on the other hand, the file is always stored in full in the user’s mailbox, thus bloating what are already fairly fragile databases. Public
25%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
/services . For troubleshooting and testing, it’s useful to launch FreeRADIUS with freeradius ‑X , which outputs all debugging messages. Other network parameters, as well as local settings for logging, threading, security
25%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
a management console (MMC) with the usual three-panel setup: the menu on the left, actions on the right, and content to reflect the context in the main window in the middle (Figure 3). The first overview shows
25%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
passwords without the hassle of logging into each host and cracking a password hash. Using it, you can check for weak FTP, SSH, TELNET, HTTP(S), POP3(S), SMB, RDP, and VNC passwords.   Figure 5 shows what
25%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
balancing). The OpenStack initiative, which was initiated in July 2010 by US hosting service provider Rackspace, NASA, and other partners, is designed to provide provide an IaaS (Infrastructure as Service

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice