Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1198)
  • Article (312)
  • News (179)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 170 Next »

16%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
they are allowed to make another login attempt. If this option is set to 0, login is simply impossible as long as the back-end server remains unavailable. A problem occurs with this approach if, say, the sudo rules
16%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
posixaccount /etc/dirsrv/schema/10rfc2307.ldif objectClasses: ( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Standard LDAP objectclass' SUP top AUXILIARY MUST ( cn $ uid $ uidNumber $ gidNumber $ home
16%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
the SecDebugLogLevel parameter to specify verbosity, on a scale of 0 to 9, which issues comments on its own activities and the way it processes user-defined rules. Levels 4 or 5 are useful for fine tuning
16%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a 0.88x12.56x9.3-inch device weighing 2.99 pounds
16%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
/type-support-working-with-sudo-logs-in-syslog-ng-4-0 The Author Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product
16%
SSH on Windows
17.09.2013
Home »  Articles  » 
Windows SSH client PuTTY, developed by Simon Tatham, is also a free SSH implementation. It is subject to the MIT license and is currently at version 0.62 from 2011. All versions of SSH are largely
16%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
://console.aws.amazon.com/cloudfront/home. Next, click on Create Distribution (Figure 2), and select Web | Continue . Under Origin Settings, enter the full address for your website (rather than my example site www.m0nk3y.biz ) and a descriptive
16%
Combining Directories on a Single Mountpoint
19.05.2014
Home »  HPC  »  Articles  » 
write test using IOzone using the same command line for both NFS and SSHFS: ./iozone -i 0 -r 64k -s 16G -w -f iozone.tmp > iozone_16G_w.out The command only runs the sequential write and re-write tests
16%
MapReduce and Hadoop
27.02.2012
Home »  HPC  »  Articles  » 
(pseudocode): method Reduce(target,counts[c1,c2,...]) sum <- 0 for all c in counts[c1,c2,...] do sum <- sum + c end emit(target,sum) end If you take a look at the schematic, you quickly see
16%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
– in this example: virsh secret-set-value 2a5b08e4-3dca-4ff9-9a1d-40389758d081 AQA5jhZRwGPhBBAAa3t78yY/0+1QB5Z/9iFK2Q== Listing 4: ceph-secret.xml 01  02   2a5b08e4-3dca

« Previous 1 ... 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 170 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice