Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (947)
  • Article (297)
  • News (167)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 142 Next »

27%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
to reduce the time it takes to process network packets. Tools like ethtool, ethtool -C eth0 rx-usecs 0 adjust these settings. Summary In this article, I explored the critical components of networking
27%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
, or remote maintenance access are increasingly being set up in the scope of Industry 4.0, and an ASM system would, one hopes, find them. According to Strobel, however, these problems are peripheral, saying
27%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
is that there is no equivalent of RAID 0+1 or 51 in ZFS – only device arrangements similar to RAID 10, 50, or 60. By default, ZFS will use any idle RAM in the system as the primary Adaptive Replacement Cache (ARC). A common rule
27%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters] DWORD DomainCompatibilityMode 1 DWORD DNSNameResolutionRequired 0 The preceding code tells the registry to add two DWORD
27%
Rex
19.02.2013
Home »  Articles  » 
_syslog => "local0"; You need to add one of the two lines to the Rexfile before the first task. A word of caution: In both cases, only the messages generated by Rex itself end up in the logfiles. The returned uptime
27%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
']; 04 for (_i = 0, _len = _ref.length; _i < _len; _i++) { 05   auto = _ref[_i]; 06   alert(auto); 07 } Additionally, for [...] in lets you create comprehensions — that is, functions that generate a new
27%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator client runs on Android, iOS, and BlackBerry devices
27%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
PowerShell\v1.0\;C:\Program Files (x86)\Common Files\Citrix\System32\ To use Cygwin effectively, you need to add E:\Cygwin\bin to your PATH environment variable. Of course, use the location of your installation
27%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
. That means you need to define a different separator – the new separator follows the option with the angled brackets: hostlist relay_from_hosts = <; 85.214.7.0/24; 2a01:238:10b::/56 If you are configuring
27%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.0 release, including time delays

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 142 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice