Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (232)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 174 Next »

12%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
the reason for this, you have to look back at early Unix systems, which were not originally designed for a desktop networked into the global Internet. This resulted in two main mechanisms of access control
12%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
be accessible on the web. In the previous version of OpenStack, "Essex," the world was more or less still in order in this respect: Nova Network took care of the network itself as a component of the Open
12%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
Frequently, technologies initially used in large data centers end up at some point in time in smaller companies' networks or even (as in the case of virtualization) on ordinary users' desktops
12%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
VPN. The free SSL virtual private network (VPN) joined the mainstream with release 2.1, and it is useful for large-scale setups. Aladdin [2] dominates the market for USB stick-based cryptographic access control
12%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
Peter knows Paula, a freeway links Cologne with Dortmund, and a network cable leads from Marvin to Zaphod. These relationships can be recorded in a visually intuitive way (Figure 1), and the results
12%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
a Docker network: docker network create gcpemulators-demo To begin, create a Docker image to launch the Pub/Sub service locally after creating the Dockerfile in Listing 1 [1]: docker build . -f Dockerfile
12%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
=Pro-active monitoring utility for Unix systems 090 After=network.target 091 Documentation=man:monit(1) https://mmonit.com/wiki/Monit/HowTo 092 093 [Service] 094 Type=simple 095 KillMode=process 096 Exec
12%
What’s New in Microsoft Windows 8.1
21.01.2014
Home »  Articles  » 
files, which administrators can distribute over the network. I will talk more about this later. Another new feature in Windows 8.1 is the ability to categorize the way apps are displayed in the All Apps
12%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
various security zones, such as public WLAN, home, or corporate networks, and then automatically uses corresponding rules. The service can be configured with the graphical tool firewall-config (Figure 3
12%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is still one of the most dangerous vulnerabilities that web administrators face on today's networks. The development of tools such as SQLmap makes it very easy for hackers to break into systems and cause

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice