Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 148 149 150 151 152 153 154 155 156 157 158 159 160 161 ... 201 Next »

17%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
. Mitmproxy forwards the request to the server through the connection initiated in step 4. This simplified process sequence shows the sophistication of the actions performed by mitmproxy just to slip
17%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
as a new language [4] for scientific and technical computing. Since its relatively recent public release in 2012, its unique melding of advanced concepts in language design with uncompromised performance has
17%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
assigns a unique ID to the user. It is advisable to assign values 1000 or below to administrative accounts; for example: admin:g6j0pelqmhg2n72zx947lf72rxf4iqzzml9zzrcnfzgreguqx69nopme6ctq8r8s:1000
17%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
the Group Policy (Figure 4). To do so, you will probably want to create a separate Group Policy Object (GPO) and then link it with the domain or with the organizational unit (OU) containing the mobile devices
17%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
install the Suhosin Patch [4], which some Linux distributions and various BSD systems already include. Incidentally, a complete port exists for Python, and a variant with a limited feature scope exists
17%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
can handle the set up at the command line on the host system – a Red Hat 4.1.2-based CentOS (kernel v2.6.27), or with the XenCenter application by clicking and installing. Setting up the hardware
17%
Managing VHD devices
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Roman Smitko, 123RF
of the objects currently in the BCD Store, type bcdedit /enum -v (Figure 4). The output shows that Windows 7 uses a 32-digit GUID. Whenever you change an entry, you must specify this GUID
17%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
of the current CPU load and disk utilization. Logging into the Domain The LogonSessions tool lists all the active sessions on a computer at the command line (Figure 4). If you run this command without setting
17%
Intelligent Stack
07.12.2025
Home »  Articles  » 
Lead Image © antoinepham2903, 123RF.com
, and they bring that expertise to the challenge of tuning systems for AI. openEuler includes a number of tools for improving and optimizing performance. For instance, A-Tune (Figure 4) is an AI-powered tuning
17%
Quick patches with Ansible
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © David Crockett, Fotolia.com
not cause any additional overhead. A typical inventory file (Listing 1) can look relatively simple. Whether structured in YAML [4] or the INI format, it ultimately has no influence on the results. I opted

« Previous 1 ... 148 149 150 151 152 153 154 155 156 157 158 159 160 161 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice