Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1184)
  • Article (265)
  • News (44)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 143 144 145 146 147 148 149 150

19%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
because, if you choose not to use it, there is no effect. All of the above features and others are described in greater detail in the MariaDB Knowledgebase [3]. Compatibility With MariaDB, every effort
18%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
techniques and compression algorithms. Public key: RSA EIGamal DSA Cipher: IDEA 3DES CAST5 [Symmetric-key block cipher. 64-bit block size, key size between 30 and 128 bits
18%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
the package. Because I use an Ubuntu system, I use the following command: $ sudo dpkg -i /chefsource/chef-server-core-6.1.deb Note: CentOS or Red Hat users would, of course, use the rpm utility. Once
18%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
advanced configurations such as multiple network interfaces on a single VM, custom routing, and the use of both public and private IP addresses. Additionally, Azure's support for IPv6 and its API offerings
18%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
information, such as home drives or Windows Local Administrator Password Solution (LAPS). According to MITRE ATT&CK [3], attackers derive their techniques from these three AD functions and deploy them
18%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
hope to orient you in the correct direction for deploying a log analysis capability. Splunk Although I'm a big supporter of open source, Splunk [3], a commercial product, is probably the gold standard

« Previous 1 ... 143 144 145 146 147 148 149 150

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice