Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (123)
  • Article (42)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 17 Next »

97%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
remember using it at Linux Networx in the early 2000s. Over the years, it has been developed by Lawrence Livermore National Laboratory, SchedMD [5], Linux Networx, Hewlett-Packard, and Groupe Bull [6 ... 48
97%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
], which provides application-based intrusion detection, or the ModSecurity web application firewall [6], which can be configured with the OWASP ModSecurity Core Rule Set [7]) generate sufficient logfiles ... 48
86%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... them in an orderly manner. Proxmox VE has been covered before in other articles [5][6], so I suggest you check them out if you want an in-depth review
61%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
Rubén Llorente ... . Citadel Rooms Citadel's main characteristic is that everything is a room, at least internally. Rooms are arranged by floors (Figure 6). For example, on a floor called Animal Talk , you might have the rooms
61%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... ). Figure 4: A VPN allows computers in a network to contact devices located in a separate office over a secure connection. Ludovic.ferre CC BY-SA 4.0 [6
61%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
Rubén Llorente ... of domains for which you host email, managing quotas, and viewing the logs (Figures 6 and 7). Figure 6: iRedAdmin lets you create email accounts for users
61%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
Rubén Llorente ... obtaining the password is no longer enough for the attacker. The steps for using the Nitrokey in such a way are documented [6], but setting up the configuration involves messing with PAM configuration files
61%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... is well documented [5], and you can find useful tips on their website. Of special interest is the Recipes section [6], which includes example tasks for uploading files or copying scripts into the servers
36%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
as you create the default route. Just pass in the routing destination with an appropriate prefix. For example, using netsh interface ipv6 add route 2001:db8::/48 11 \ fe80::20f:23ff:fef5:68eb routes ... Windows provides a simple dialog box for configuring IPv6, but the available settings only scratch the surface. IPv6 comes with many features that are primarily managed using the command-line tool ... Configuring IPv6 on Windows ... Configuring IPv6 in Windows with NetShell ... IPv6 on Board
36%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
:YYZZ::/48). The rest of the 6to4 address defines the subnet and the interface ID of the host on the network. From the perspective of a 6to4 host or router, the entire 6to4 site is comprised of a single ... Now that IPv6 is the official Internet protocol, all that remains is the simple task of migrating all the machines on the Internet. Until that happens, tunnel technologies provide an interim solution. ... IPv6 Tunneling Options ... IPv6 tunnel technologies

« Previous 1 2 3 4 5 6 7 8 ... 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice