Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (116)
  • Article (3)
Keywords

« Previous 1 ... 5 6 7 8 9 10 11 12

25%
Reading and understanding database execution plans
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Gunnar Pippel, 123RF.com
----------------------------------------------------------------- 15 | 0 | SELECT STATEMENT | 3130K | 833 | 16 |* 1 | HASH JOIN | 3130K | 833 | 17 |* 2 | TABLE ACCESS BY INDEX ROWID | SALES | 566K
25%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
to the root user. If you want to check all files, you can set scan_ignore_root="0" in the conf.maldet configuration file to check the entire database. When maldet needs to scan large areas of the filesystem
25%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
-type traffic, as well as for the local link address (i.e., good old 127.0.0.1). Getting IPv6 Connectivity You can get IPv6 connectivity in several ways: native IPv6 access, IPv6 tunnels, Teredo (Miredo on Unix
25%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
350 -gravity center crop 480x320+0+0+repage standardphotos/$i; done MobaXterm's core functionality is its Cygwin compatibility layer, which also contains a port from the original XOrg server
25%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
into small enough chunks to be written to DVD, or even CD. Backups are defined by "levels," with 0 level indicating a full backup; the subsequent levels are backups of the changes made since the last n - 1
25%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
classifies each pair into self-defined optimization categories. Category 0 means it cannot be optimized. Category 1 means it can easily be optimized. Category 2 means that although one or more other
25%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
the required cluster in just a few minutes. The following example assumes that all commands are run on Ubuntu 22.04, but most of the commands will probably work on other distributions with just a few minor
25%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
.g., A becomes 4, E becomes 3, O becomes 0, 1 becomes !, etc.), makes the password even more complicated and does not make it any easier to handle. For example, the Robbie Williams refrain Hell is gone and heaven
25%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
to separate IP addresses in its configuration. That means you need to define a different separator – the new separator follows the option with the angled brackets: hostlist relay_from_hosts = <; 85.214.7.0

« Previous 1 ... 5 6 7 8 9 10 11 12

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice