Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 08 Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (116)
  • Article (1)
Keywords

« Previous 1 ... 5 6 7 8 9 10 11 12

18%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
configuration, you might want to test the device itself. To do so, scan a fingerprint by giving the tf-tool --acquire command (Figure 3). Then you can use tf-tool --verify
18%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
::1 (all nodes; Figure 3). The payload of this message includes all valid IPv6 prefixes on the local subnet and other flags that allow a sophisticated configuration. The RA message is also repeated
18%
The PHP FastCGI process manager, PHP-FPM
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© conceptw, 123RF.com
. In contrast, the information on the PHP-FPM website [2] and in the PHP documentation [3] is outdated or incomplete. If you cannot find an example file, download the official PHP source code package and take
18%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c3:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue
18%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
user_u:system_r:httpd_t root 3728 1 2 10:49 ? 00:00:00 /usr/sbin/httpd 07 user_u:system_r:httpd_t apache 3730 3728 0 10:49 ? 00:00:00 /usr/sbin/httpd 08 ... The weird
18%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
://learn.microsoft.com/en-us/security/privileged-access-workstations/esae-retirement Privileged Access Management and Shadow Principals: https://www.teal-consulting.de/en/2018/08/14/esae-series-part-3
17%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
Protocol (CARP) is used in the background [3]. If needed, a pfSense installation can transfer its configuration to all other firewalls and then run pfsync to keep the state tables of all the active firewalls

« Previous 1 ... 5 6 7 8 9 10 11 12

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice