Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 160 Next »

38%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
that simply because a term is a reserved word does not mean you cannot have a column or table with that name. It simply means that to use that word you have to enclose it in backticks. Query generation tools
38%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
, which Andres Freund discovered by chance. The EASM market segment is home to various major players such as IBM (with the acquisition of Randori in 2022), Google Cloud (with the acquisition of Mandiant
38%
The PHP FastCGI process manager, PHP-FPM
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© conceptw, 123RF.com
changes to the PHP configuration, you must restart the Apache server. Any active users experience a disconnect and see an error message. PHP-FPM does not require a restart: You can modify the configuration
38%
Generating information with the touch of a button
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
. Installation was pretty straightforward, except the .tar.gz files were not really gzipped tar archives, so the command tar xvz failed with the error tar: This does not look like a tar archive . They turned out
38%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
, the program displays progress information for the current scan. SYN or half-open scanning (Figure 3) is an alternative approach. In this case, Nmap does not actually open a TCP connection but simply requests
38%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
, but it does offer maximum protection if you additionally define filters and actions (see also the "Insider Attacks" box). The software offers a number of prebuilt alternatives here, including converting request
38%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
. The body of the loop sleeps for a specified period then searches the output of the ps command for the application name (gauss). The grep command does the search and returns the number of matching lines
38%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
change to a node. This means users can log, visualize, or revert manipulations. None of the five free graph databases offers this feature. Traversal Does Peter know my buddy Dieter? Can I get from Berlin
38%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
a repository server-side for your recipes: This is simply a hierarchy of multiple, standardized (sub-)directories. Of course, you could create them all manually, but the template provided by Opscode does
38%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
with nearly native performance. However, KVM does need a state-of-the-art CPU generation with virtualization functionality (VT-X/AMD-V). All the virtual machines in this article will run on the KVM hypervisor

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice