Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1337)
  • Article (104)
  • News (104)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 155 Next »

35%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
IPA" by Thorsten Scherf: http://www.linux-magazine.com/Issues/2009/102/FreeIPA The Author Thorsten Scherf is a Senior Consultant for Red Hat EMEA
35%
Controlling multiple systems simultaneously with Synergy
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
©Kheng Ho Toh, 123RF.com
options: http://synergy-foss.org/pm/projects/synergy/wiki/Setup Security notes: http://synergy-foss.org/pm/projects/synergy/wiki/UserFAQ#Q-How-secure-is-your-application Tunneling with SSH: http://www.revsys.com
35%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
.gz?download Yubico website: http://www.yubico.com/products/yubikey/ SSH server for Yubikey: http://code.google.com/p/yubico-pam/downloads/ Dogtag PKI: http://pki-svn.fedora.redhat.com/wiki/PKI_Main_Page Open
35%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
status of a volume of data. Infos LVM how-to: http://www.tldp.org/HOWTO/LVM-HOWTO LVM mailing list: http://www.redhat.com/mailman/listinfo/linux-lvm
35%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
, a request like http://www.example.com/index.html?file=/etc/passwd would trigger the sample rule in line 8. Then the action defined in line 9 would block the request. The client sees an HTTP 403 Forbidden
35%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
. To verify that your IPv6 setup works, try pinging a known host – Google is a good bet (Listing 2). Listing 2 Testing IPv6 Setup 01 # ping6 ipv6.google.com 02 PING ipv6.google.com(iy-in-x63.1e
35%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
Logging sudo child processes: https://www.sudo.ws/posts/2021/08/what-is-coming-in-sudo-1.9.8/ syslog-ng configuration examples: https://www.syslog-ng.com/community/b/blog/posts
34%
SSH on Windows
17.09.2013
Home »  Articles  » 
for managing hosts or user interfaces. The word has spread, and Windows administrators can now turn to many graphical tools, such as PuTTY and MobaXterm, as clients. Info [1] WinSSH: [http://www.ssh.com] [2
34%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
-keys --keyserver keyserver.ubuntu.com 98AB5139 Now, update the package list and install the current 4.1 version of VirtualBox: apt-get update && apt-get install virtualbox-4.1 For VRDP support, you still need
34%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
/Linux\r Ubuntu 10.04.4 LTS\r \r Welcome to the Ubuntu Server!\r * Documentation: http://www.ubuntu.com/server/doc\r \r System information as of Thu Oct 11 15:55:28 CDT 2012\r \r System load: 1

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice