Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 137 138 139 140 141 142 143 144 145 146 147 148 149 150 ... 154 Next »

12%
Live Kernel Update Tools
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Andrea, Fotolia.com
if a kernel patch fixes a critical problem that affects, for example, central drivers for the network hardware. You cannot unload and reload these drivers easily to benefit from the corrected functions. Red
12%
Kernel and driver development for the Linux kernel
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © psdesign1, Fotolia.com
triggered since the last boot, then, you can simply enter the cat /proc/interrupts command in a terminal. To pass network traffic through, on the other hand, the superuser only needs to write 1 to the /proc
12%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
of network intrusions, and more than 50 percent use some form of hacking. A 2013 SplashData study on data from an Adobe breach showed the top five most used passwords are: 123456, password, 12345678, qwerty
12%
Grafana and time series databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Raoul Fesquet, fotolia.com
of virtual machines running per customer, the number of virtual networks created, or the entire memory consumed by all of a customer's volumes. Such a workload is not perfectly suited for MySQL, so Ceilometer
12%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
threats on the network. Threat hunting requires more than just reviewing logfiles or waiting for signature-based Intrusion Detection System (IDS) tools to send alerts. A threat hunter looks deeply
12%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
. The password database is local, so the whole thing works without online access. Neither passwords nor hash values leave your internal network. The prerequisite for checking passwords against the HIBP list
12%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
of cloud-native applications. Remember, cloud native means a form of application development that does away with large monoliths and instead relies on a network of microprograms that communicate with each
12%
Automate macOS 12 with the Shortcuts app
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kirsty Pargeter, 123RF.com
access to resources locally or on the network, they request them on first use. You will find any permissions granted in the Privacy tab, where you can revoke individual permissions or reset data security
12%
Acorn facilitates the deployment of apps in Kubernetes
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Önder Örtel on Unsplash
and networking methods is likely to lose faith in the service really making anything easier – especially when the format in which Kubernetes accepts resource definitions with kubectl is not particularly intuitive
12%
Manage projects in SMEs with OpenProject
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pedro Miranda on Unsplash
. Installing new network storage, for example, can be such a case, and it can be broken down into quite a few smaller units. From planning, to requests for quotes, procurement, physical installation in the rack

« Previous 1 ... 137 138 139 140 141 142 143 144 145 146 147 148 149 150 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice