Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1167)
  • Article (116)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 140 Next »

36%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
-list +--------------------------------------+-----------+------------------ | id | name | subnets | +--------------------------------------+-----------+------------------ | 42a99eb6-3de7-4ffb-b34e-6ce622dbdefc | admin-net|928598b5
36%
Redfish standard as a replacement for IPMI Chassis Management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © isselee, 123RF.com
is therefore working on support for UEFI 2.5 HTTP Boot. Dell customers can start experiencing Redfish with version 2.30.30.30 of the integrated Dell Remote Access Controller (iDRAC). The Open Compute Project
36%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
before the fingerprint encode the algorithm and hash method used [1]. Digits 1 to 4 on the left stand for (in ascending order) RSA, DSA, ECDSA, and Ed25519. No algorithm has been assigned for 5 yet, and 6
36%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
and deducts many points. The exposure value now drops to 5.7 (Figure 4). The rating now confirms a MEDIUM level of security, and for the first time the emoji now looks neutral and no longer unhappy about
36%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
Architecture I'll use a simple example of a single-socket system with an AMD Ryzen Threadripper [5] 3970X CPU that has simultaneous multithreading (SMT) turned on. A first step in understanding how
36%
Package applications in Docker containers
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Jonathan Sanchez on Unsplash
that includes a web front end (Figure 5): $ sudo apt install covenant-kbx Figure 3: When installing Kaboxer packages with Debian's package system, the content
36%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
in Google Material Design [5]. Because it is one of Flutter's standard libraries, you do not have to install it retroactively. Alternatively, some Cupertino-style widgets mimic the look of a native iOS app
36%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
. Before launching, you need to prepare a simple configuration file named config.yml. For example, you could set up common DNS servers as the upstream and the domain blacklist from abuse.ch [5] (Listing 1
36%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
. Infos AIDE: https://github.com/aide/aide/releases/ The Author Dr. Matthias Wübbeling is an IT security enthusiast, scientist, author, consultant, and speaker. As a Lecturer
36%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
of attack surfaces in the context of individual IT environments is a key function of any ASM system. © Google Cloud/Mandiant [5] According to the provider, the prioritization logic considers numerous

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 140 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice