Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1181)
  • Article (278)
  • News (128)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 121 122 123 124 125 126 127 128 129 130 131 132 133 134 ... 159 Next »

15%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
-conf --add-device USB-device-name (Figure 6). The command pamusb-conf --add-user user Figure 6: The USB device is identified by its properties. If the user
15%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
to tell fdisk the desired "disk geometry" first because this information cannot be gathered from a block device when you are just working with a file copy. 6. losetup and cryptoloop Working with copies
15%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
for an alternative to Nessus, the Metasploit Framework [6] is an open source, but far more complicated, security scanner – see the "Metasploit" box.) Metasploit The Metasploit Framework, which was programmed
15%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
for small and medium-sized setups in the form of Easy RSA, and this tool is fine for test purposes. Admins who need larger PKIs can turn to tools like OpenCA [6] or outsource the task to a service provider
15%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
: channel://pear.horde.org/webmail-4.0.6 The directory Horde uses to deliver existing static content in an efficient way is /var/www/webmail/static/. The web server needs write permissions for this directory
15%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
.250:20): avc: denied { getattr } for pid=2603 comm="httpd" path="/docroot" dev=sda6 ino=24481 scontext=user_u:system_r:httpd_t:s0 tcontext=user_u:object_r:default_t:s0 tclass=dir The messages you
15%
Create your own turnkey solutions
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fandorina Liza, 123RF.com
your choice of operating system. Like JumpBox, BitNami also provides cloud images that can be deployed on Amazon EC2 or GoGrid [6]. Presumably, you could also launch the images on Eucalyptus
15%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
box project. As shown in Figure 2, the Dev Box user experience starts at the Microsoft Dev Box website [6]. Alternatively, you can use the Microsoft sign-in page as another entry point. The web
15%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
cores (57, 60, or 61), memory size (6, 8, or 16GB), clock speed (1053, 1100, or 1238MHz), and cooling concept (active or passive). The basic architecture is the same for all cards: Like the Larrabee
15%
Integrating AWS Cloud Services with Your Custom Apps
21.01.2014
Home »  Articles  » 
: $ python -i interact.py r-72ffb53e i-1df79851 terminated r-9b6b61d4 i-3021247f terminated >>> To save yourself the trouble of repeatedly typing the region and the authentication information, Boto gives you

« Previous 1 ... 121 122 123 124 125 126 127 128 129 130 131 132 133 134 ... 159 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice