Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1346)
  • Article (336)
  • News (252)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 194 Next »

9%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
': 07 ensure => running, 08 enable => true, 09 hasrestart => true, 10 require => Package['openssh-server'], 11 } 12 13 augeas { 'Set SSH Protocol to 2': 14 context
9%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
) provides a simple and secure way to make public keys for email addresses available over HTTPS. The underlying standard was first implemented in GnuPG version 2.1.12 and has been enabled by default since
9%
Confessions of a Patchaholic
17.10.2011
Home »  Articles  » 
 
available software program is listed here but these three are worth further exploration. I personally have experience with all three of these systems and have used them over the past 12 years in large complex
9%
Exploring the Linux Tuning Guide for AMD Opteron 6200 Series Processors
16.07.2012
Home »  HPC  »  Articles  » 
cache.” Other resources, such as a floating-point unit, are shared between the two cores within the same module. The AMD Opteron 6200 Series processors come in 4-, 8-, 12-, and 16-core models. The 16
9%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
, the widget by pressing e when a widget is selected. Figure 11 shows an example of expanding the CPU usage chart. Figure 12: Screenshot of Bottom with expanded
9%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
, 12 openSUSE Tumbleweed, Leap 15.3, Leap 15.2 Oracle Linux 8.5, 7.9 Mitigating such an attack would rely largely on system policies being enabled that prevent the features required
9%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
, but Microsoft assumes many manufacturers will provide biometric hardware solutions in the next 12 months. The situation already looks better for fingerprint sensors. All available solutions are supported
9%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
and understand the dependencies used in the snapshot archive package [12] if they are outdated. The experimental toolchain already works in a chrooted build environment, for example, with pbuilder [13]. Package
9%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
->can_read($timeout); 11 12 foreach $socket (@ok_to_read) { 13 $socket->recv($data_buffer, $flags) 14 print $data_buffer; 15 } The script starts by declaring the IO::Select module for use. A new instance
9%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
by the manufacturer was, and unfortunately still is, a painful experience. SDN has appeared in tandem with Network Function Virtualization (NFV) [12] for some time. Both technologies are high on the list of topics

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 194 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice