Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 德州俱乐部申请(网址dv9500.com)德州俱乐部申请(网址dv9500.com)w7s ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (16)
Keywords

« Previous 1 2

84%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
1 split.sh 01 #! /bin/sh 02 for i in `ls -1 archive/cur` 03 do 04 # Define name component for the individual mail directory 05 pref=`date +%Y-%m-%d-%H-%M-%S` 06 07 # Push mail
84%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
ban/filter.d/sshd.conf file. Don't worry: this first example isn't too trying. The two salient lines in the config file are as follows: failregex = ^%(__prefix_line)sFailed (?:password
83%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
Amazon started converting its excess computational power to cash some time ago. Under such names as EC2 (Elastic Computing Cloud), S3 (Simple Storage Service), and SimpleDB, the book and coffee
80%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
, which already has the required ports open at the server and firewall(s). We recommend not using Yum for every Red Hat Enterprise Linux (RHEL) server because it opens too many systems to intrusion, which
79%
Apache 2.4 with mod_lua
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Tom Grundy, 123RF.com
of methods, which you can use to output the page to be served up. To see how this works, check out Listing 1 [7] with the obligatory Hello World example. Comments in Lua always start with two hyphens. r
79%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990s by Sun Microsystems, PAM is available on most Unix-style systems

« Previous 1 2

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice