Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 102 103 104 105 106 107 108 109 110 111 112 113 114 115 ... 160 Next »

38%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
and thus does not produce a log entry. Using -S lets you specify the syscall to be monitored, and -F determines a control field. Of these, several dozen are very well described in the man page for auditctl
38%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
Write method, the key and value are stored using just one statement. PowerShell: How does PowerShell set the default? In principle, PowerShell uses the same commands for editing the registry
38%
Testing the Samsung MU-PA500B 500GB SSD
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Lucy Baldwin, 123RF.com
distributions will automount this large device with no trouble whatsoever; it ships formatted as a single exFAT partition. The specified maximum transfer rate is 540MBps. Does the device keep up
38%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
Master [9] to take care of the process, because Windows does not include tooling for this purpose. If you dare to take your chances and open up a laptop, you can build a remarkable, compact, single
38%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
device; it then informs the zpool that the ZFS pool data does not physically exist but is available as a loop device below /dev. The sector offset for the zfs0 partition is 4195362. Because this value
38%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
, CrowdSec on Windows does not yet support automatic configuration at install time. Some work is required after installing the agent. The default configuration intercepts brute force attacks against
38%
Monitoring changes in Active Directory with built-in tools
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Tobias Tullius on Unsplash
line. If you want the configuration to be used, it needs to be enabled. On newly installed systems, the correct value is set by default and does not need to be defined explicitly. However, best practices
38%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
such as Alpine. The concept of a distroless image was largely coined by Google and describes images that contain only the application itself along with the runtime dependencies (i.e., only the components
38%
A new approach to more attractive histograms in Prometheus
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Markus Winkler on Unsplash
. The application that outputs the histograms determines the schema on the basis of initial hints. The traditional Prometheus time series database does not allow for a sparse display. A classic histogram typically
38%
Cooperation with Cyn.in
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Jo Coenen - Studio Dries 2.6 on Unsplash
to optimize communication and improve the exchange of data and information. The Cyn.in system also does justice to this requirement by implementing contextual workspaces. You can create them in the Spaces

« Previous 1 ... 102 103 104 105 106 107 108 109 110 111 112 113 114 115 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice