Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 171 Next »

23%
Secure email communication
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Simon Moog on Unsplash
recipients specified in the forwarding list. This is also how mailing lists, such as those belonging to the popular Mailman software [4], work by default. The mail servers of these recipients should reject
23%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
. The Mitigations section lists two potential countermeasures: Software Configuration and User Training. The Software Configuration countermeasure references SPF, DKIM, and DMARC (see also [4] and the "Trustworthy
23%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
into this vortex. Although Exchange is still available on-premises, Microsoft is increasingly focusing on cloud products [4]. European companies cannot transfer their data to a third-party cloud, even more so
23%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
focused. The Algorithms TutaCrypt [4] uses a combination of relatively new quantum-resistant algorithms and well-proven classical encryption to offer a hybrid protocol. The quantum
23%
Operating system images with bootc
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © alfazetchronicles, 123RF.com
container-based workflow for both your applications and your operating systems. You will find more information about this new deployment method for operating systems on Red Hat's image mode page [4
23%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
and waits for the request to complete, keeping the connection alive; and finally, (4) because the server can only process a limited number of simultaneous connections, a large number of slow connections
23%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
IO's performance is heavily dependent on network speed. Choose high-bandwidth network interfaces (10Gbps or higher) to minimize network bottleneck issues. For the filesystem, MinIO recommends XFS or ext4
23%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
Compose, volume specification becomes streamlined and readable, especially when dealing with multi-container, stateful legacy applications. Listing 4 shows how you could define a service in docker
23%
PC over IP
03.09.2013
Home »  Articles  » 
 
. Fundamentally, although you do not need to install additional software on a computer with an integrated Teradici host card, the optional and free host software provides some convenient functions (Figure 4
23%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
": 43.772828,"longitude": 11.249488},     "properties":{       "serial_number":"AH8S672BD89S792S9SHD9SHD-618162",       "warrenty_expiry":"2015-01-01"     } }'   {"id": "51b0a600e4b035748740f714

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice