Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (948)
  • Article (319)
  • News (109)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 131 132 133 134 135 136 137 138

16%
System logging for data-based answers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Gerard Boissinot, Fotolia.com
on the server(s). You have several ways to accomplish this, ranging from easy to a bit more difficult. Remote Logging the Easy Way The simple way to perform remote logging comes with some risk: Configure a cron
16%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
the conditions for the rapid growth of the Internet in the 1990s, as the algorithms maximized throughput, minimized delays, and ensured low losses (Figure 1). The source and target TCPs attempt to determine
16%
Linux I/O Schedulers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © pandavector, 123RF.com
from a NOOP I/O scheduler. Anticipatory The anticipatory I/O scheduler [3] was the default scheduler a long time ago (in kernel years). As the name implies, it anticipates subsequent block requests
16%
Interview with the developer of Singularity
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wu ruiyun, 123RF.com
Layton: Hi Greg. Tell me bit about yourself and your background. Gregory M. Kurtzer: My work with Linux began back in the mid-90s, after I obtained my degree in biochemistry and focused early on genomics
16%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
variables; execute the application(s); and so on. When the job finishes or the time allowed is exceeded, the job stops and releases the resources. As resources change in the system (e.g., nodes become
16%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
. The platform also comes with secure email communication that supports OAuth 2.0 for POP3 and IMAP email protocols to enable modern and secure authentication for the retrieval of email from services
16%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
considerations into their business continuity planning? Is cybersecurity incorporated into the annual exercise, either in the form of a live exercise or a tabletop exercise? Are the system(s) within
16%
Nothing works without a profile
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © abidal, 123RF.com
V\Client\Packages\\REGISTRY\USER\\ HKCU\Software\Microsoft\AppV\Client\PackageGroups\\REGISTRY\USER\\ Example:HKCU\Software\Microsoft\AppV\Client\Packages\4FE4455B-E307-4D62-A29C4912D8AB8F38\REGISTRY\USER\S
16%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
information, such as home drives or Windows Local Administrator Password Solution (LAPS). According to MITRE ATT&CK [3], attackers derive their techniques from these three AD functions and deploy them
16%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
shares, including vWorkspace [3] and Pano Logic [4]. What VDI Means When you consider all the benefits, you might expect virtual desktops to be used in environments at least a few dozen clients

« Previous 1 ... 131 132 133 134 135 136 137 138

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice