Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (119)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 151 Next »

16%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
ZJOUoUsZGlkk client2:q0eL78zFrbnESW6c/F0qit5MNCpS8IBgyh1BdXiyyuI client3:zkq8eT31Nib3IHWfp0yyu15BCW52VMbY8+LhVUt3ylA The client uses the appropriate password in the /etc/stunnel/psk-client1.txt file: client1:Wf
16%
Tested: Barracuda firewall X201
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Barracuda firewall series. The X201 version (right) has a wireless interface. An optional accessory available for all Barracuda firewalls is a 3G USB modem, which was developed by the manufacturer
16%
Manage Linux containers with Docker
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © 36clicks, 123RF.com
everything it needs. The key technology enabling this approach is LXC, or Linux Containers [3]. Unlike a hypervisor-based virtual machine like Xen, LXC doesn't provide a full virtual machine with hardware
16%
Elephant Shed PostgreSQL appliance
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © victor zastolskiy, 123RF.com
a database server. Among other things, you can use it for fine-tuning, to monitor its vitals, and to design and execute a backup strategy. The appliance uses Prometheus [2] and Grafana [3] to collect
16%
Monitoring IPv6 with Wireshark
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Suzanne Tucker, 123RF.com
and is usually expressed as eights sets of four hexadecimal digits (known as nibbles, quibbles, or hextets) separated by colons. For example, an IPv6 address looks like this: 2001: 0db8: 1010: 61ab: f005: ba11: 00
16%
Live Migration
18.02.2014
Home »  Articles  » 
on a host, moving it to another virtualization host, and continuing operations there with no noticeable hiccups in service from the user’s point of view, is the art of virtualization and is what separates
16%
Total Network Monitor
20.08.2013
Home »  Articles  » 
 
(Figure 3). In this way, you can also query websites, Outlook Web App, intranet sites, and SharePoint libraries. Figure 3: Monitoring various protocols
16%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
In consumer electronics such as microwave ovens, cameras, and cellphones, every component is optimized to that particular device’s application. This approach is known as co-design, whereby systems
16%
Certificate security
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jennifer Huls, 123RF.com
hash value, F1lYgMAWJed1UM9BWAk3PKUxZhtSATn8LV17W9Uw6MKA=, verifies the authenticity of the public key of the host system in production use. The second hash value, UGNuJ8wOBY9qt6K4eulsEY6vC0sOhhf1FoJVT1
16%
Mail Helpers: Improve Your Email Experience with These Handy IMAP Extensions
08.07.2013
Home »  Articles  » 
 
. Under this umbrella, RFC 4550 gathered more than 20 IMAP protocol extensions explicitly to improve communication with mobile clients. Although it’s possible that no server has implemented the more exotic

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice