Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 132 133 134 135 136 137 138 139 140 141 142 143 144 145 ... 184 Next »

13%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget
13%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
for each class, and the recommended values (decimal and binary) of AF codepoints. Table 1 Assured Forwarding Codepoints Priority Level Class 1 Class 2 Class 3 Class
13%
Moving data to Drupal 8
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Konstantinos Kokkinis, 123RF.com
on contributed modules providing their own upgrade paths. Most Drupal sites use many contributed modules, and after you click Review upgrade , you will see a list of missing upgrade paths (Figure 3). Before you
13%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
is like adding a virtual cable between your two VPCs (Figure 3). You need to accept this peering in a separate step. So that the VMs can find their way out of the outer VPC later on, you now need to create
13%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
In early October 2022, the Internet Systems Consortium (ISC) released versions 4.4.3-P1 and 4.1-ESV-R16-P2 of the ISC Dynamic Host Configuration Protocol (DHCP) server. At the same time, the non
13%
SSH tools for Windows
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Maksim Kabakou, 123RF.com
in PuTTY, such as puttygen or psftp. In addition to the popular PuTTY, Windows admins have options for using SSH on Windows, such as the Cygwin Windows X server-based MobaXterm [2] [3] or direct use
13%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
NSS volume. Filr supports the NTFS ext3, XFS, and Btrfs filesystems. If you want to use Filr just to serve up user directories (My files ) rather than network folders, the system can also operate
13%
PC over IP
03.09.2013
Home »  Articles  » 
 
and data, PCoIP can allow or prohibit looped USB devices explicitly. Workstation with Host Card With a host card, you can turn a powerful Windows or Linux PC (and probably Macintosh computers from 2013Q3
13%
SSH on Windows
17.09.2013
Home »  Articles  » 
-keygen -t rsa (optionally, ssh-keygen -t dsa ) to generate a new RSA or DSA key pair of public and private keys (Figure 3). Figure 3: Generating a RSA key
13%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
, or simulated by the honeypot. The set of services visible to the attacker on the target system is equal to the total set of the services offered by the server and the analysis system (Figures 3 and 4

« Previous 1 ... 132 133 134 135 136 137 138 139 140 141 142 143 144 145 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice