Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (937)
  • Article (296)
  • News (166)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 141 Next »

28%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in the scope of Industry 4.0 or smart factory initiatives. Although cyber risk management is required by law (e.g., in NIS2), ASM is not. However, any company that becomes aware of attack surfaces as part of its
28%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
and in heterogeneous environments. FreeNAS also supports AFP for Mac OS X environments, including Time Machine backups. Each service can be configured from its corresponding wrench icon (Figure 2
28%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters] DWORD DomainCompatibilityMode 1 DWORD DNSNameResolutionRequired 0 The preceding code tells the registry to add two DWORD
28%
Rex
19.02.2013
Home »  Articles  » 
formulated task, you can simply issue, for example, the rex apache2 command to install apache2 on all your web servers and kit them out with the appropriate configuration files at the same time. By the way
28%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
and then run the interpreter against the file (Figure 2): coffee hello.coffee Figure 2: The command-line tools in action: first, the interpreter executes
28%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator client runs on Android, iOS, and BlackBerry devices
28%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
in Figure 2, which gives you three install choices: Install from Internet , Download Without Installing , and Install from Local Directory . If you select Install from Internet (recommended), read the note
28%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
. That means you need to define a different separator – the new separator follows the option with the angled brackets: hostlist relay_from_hosts = <; 85.214.7.0/24; 2a01:238:10b::/56 If you are configuring
28%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.0 release, including time delays
28%
Improved Performance with Parallel I/O
24.09.2015
Home »  HPC  »  Articles  » 
. By varying the number of processes from 1 to 64, you can see in Figure 2 how the wall clock time on the y -axis is affected by the number of processes on the x -axis

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 141 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice