Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 通讯录的微信怎么查-(⏭查询网站gpios.com⏮)-可以查手机通讯录吗-别人欠款如何查通讯录-催款人怎么查通讯录-(⏭查询网站gpios.com⏮)-如何查手机一年前的通讯录6Q ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1166)
  • Article (82)
  • News (13)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 Next »

72%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
elementary weaknesses of the product documentation and the developer community of ShardingSphere. On paper, the ShardingSphere UI is a Vue.js-based graphical interface for the database distributor (Figure 4
72%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
, you can quickly become confused when you hear about K3s [2], k0s [3], minikube [4], Microkubes [5], and the many other variants. These names relate to K8s distributions, all of which enrich the vanilla
72%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
-Anonymity ID Age Gender Zip Code Original Data 1 34 M 12345 2 36 F 12346 3 37 F 12347 4 35
72%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
offered by the server and the analysis system (Figures 3 and 4). Figure 3: Visible ports of an ordinary Linux web server as revealed by nmap
72%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
, as well, which makes it far easier to identify contemporary hardware. SystemRescue SystemRescue [4] is also a real veteran in the rescue distribution business (Figure 3). The previous name, System
71%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
Suite (RHCS) and use CMAN as their Cluster Manager. Depending on the version you use, the implementation will look total different. The initial variant (version 1.0) included with RHEL 4 or very old
71%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
description are specified for every parameter. Listing 4 provides an example with the definition of the binary parameter.name defines the name of the parameter, and required defines whether
71%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
information about current authentications and authorizations at short intervals (Figure 4). This feature has proven to be very useful in practice, and the statistics provide a good starting point in the event
71%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
workaround is to use Sort-Object. For example, to see a list of all services and their statuses, filtered by status, enter: PS> Get-Service | Sort-Object Status Listing 4 shows the result. Listing 4
71%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
it is started (Figure 4). An automated recognition routine for various email providers is provided, allowing the software to adapt quickly to different server addresses, port numbers, and transport encryptions

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice