Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1348)
  • Article (337)
  • News (254)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 195 Next »

9%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
integration. Inktank, the company behind Ceph, offers complete packages for all the major enterprise distributions at [12]. The only disadvantage is that Ceph currently lacks a GUI – unless you have a support
9%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
of Ubuntu, 10.04 (Lucid Lynx), which comes with Postfix 2.7 and Dovecot 1.2. In the following example, both components should be installed and functional, and the individual user accounts should come from
9%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Password = "YdhKKoy2Huq1CVHwIR" 05 Pid Directory = "/var/run" 06 Query File = "/usr/lib/bacula/query.sql" 07 Working Directory = "/var/lib/bacula" 08 } 09 10 Fileset { 11 Name = "Full Set" 12
9%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
.have_ssl() then 11 return false 12 end 13 return true 14 end The portrule in Listing 2 creates the variables svc.std and svc.ssl as associative arrays (lines 2 and 3) and then checks to see
9%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
': 07 ensure => running, 08 enable => true, 09 hasrestart => true, 10 require => Package['openssh-server'], 11 } 12 13 augeas { 'Set SSH Protocol to 2': 14 context
9%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
) provides a simple and secure way to make public keys for email addresses available over HTTPS. The underlying standard was first implemented in GnuPG version 2.1.12 and has been enabled by default since
9%
Confessions of a Patchaholic
17.10.2011
Home »  Articles  » 
 
available software program is listed here but these three are worth further exploration. I personally have experience with all three of these systems and have used them over the past 12 years in large complex
9%
Exploring the Linux Tuning Guide for AMD Opteron 6200 Series Processors
16.07.2012
Home »  HPC  »  Articles  » 
cache.” Other resources, such as a floating-point unit, are shared between the two cores within the same module. The AMD Opteron 6200 Series processors come in 4-, 8-, 12-, and 16-core models. The 16
9%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
, the widget by pressing e when a widget is selected. Figure 11 shows an example of expanding the CPU usage chart. Figure 12: Screenshot of Bottom with expanded
9%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
, 12 openSUSE Tumbleweed, Leap 15.3, Leap 15.2 Oracle Linux 8.5, 7.9 Mitigating such an attack would rely largely on system policies being enabled that prevent the features required

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 195 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice