Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 08 Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (245)
  • Article (33)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 28 Next »

28%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
eBox Technologies, and it is available as a free Basic Subscription as well as a Business and Enterprise Edition [3]. Essentially, the differences lie in the number of users and the update services
28%
Greylisting with Postgrey
22.06.2012
Home »  Articles  » 
 
: Qmail Delivery Retry Events Delivery Attempt Seconds D-HH:MM:SS 1 0 0-00:00:00 2 400 0-00:06:40 3 1600 0-00:26:40 4
28%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
. In this article, I explore a relatively new addition to Lambda functions in AWS called "layers" and, with the use of a Bash layer provided on the GitHub page by author Graham Krizek [3], I run a Bash script
28%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
. The problem is well known [3] and should be fixed in the next release. Because the index resides in volatile memory, stopping and then restarting is not a good idea. As an interim solution, you can send kill
28%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
( NULL, 'Row 3', NULL); SELECT SLEEP(1); 08 09 mysql> INSERT INTO data_random VALUES ( MD5(CURRENT_TIMESTAMP()), 'Row 1', NULL); SELECT SLEEP(1); 10 mysql> INSERT INTO data_random VALUES ( MD5(CURRENT
28%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
SeverityValue = 3; else $SyslogSeverityValue = 6; 20 21 # The name of the file is also sent with the file 22 Exec $FileName = file_name(); 23 24 # The SourceName variable is set by default to 'NXLOG'. To send
28%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
website [2]. The OCS project documentation [3] and forum  [4] will help you get started installing and configuring OCS. OpenNMS The OpenNMS network management platform [5] was predominantly developed ... 22
28%
Creating a private apt repository with reprepro
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © binkski, 123RF.com
-passphrase Several parameters in this file define the repository layout [2] [3], as follows: Origin: An optional field that describes the origin of the repository. You can select a free line of text. Label
28%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
the central calendar and address book. Mobile devices needed Microsoft's ActiveSync protocol or (up to Kolab 3) the outdated SyncML to connect with the open source groupware. As of version 3.1, the Kolab team ... Open standards and open source are requisite in Kolab groupware. The alpha release of version 3.1 hugely extended the number of compatible clients with the CalDAV and CardDAV protocols, making Kolab
28%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes. In simple terms, fail2ban [3] keeps a close eye on your

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice