Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1153)
  • News (399)
  • Article (299)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 186 Next »

18%
Symbolic mathematics with Python's SymPy library
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Buchachon Petthanya, 123RF.com
]. Additionally, you can purchase a nice book on differential equations [7] at your favorite bookstore. Although that author used another well-known free and open source computer algebra system called Maxima [8
18%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
://www.freebsd.org/releases/10.0R/announce.html ZFS on Linux: http://zfsonlinux.org The Author Hans-Peter Merkel has focused on data forensics for many years in the open source community. He trains employees
18%
A new approach to more attractive histograms in Prometheus
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Markus Winkler on Unsplash
for various open source monitoring tools such as Prometheus, Thanos, and Grafana.
18%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
Multifactor authentication (MFA) is another important security feature in Windows 10. The MFA options are based on the open standards of the FIDO Alliance and should reduce the need for additional devices
18%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
configuration. The first step is to copy the jail.conf file, which you shouldn't edit, to jail.local, which you should edit: $ sudo cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local Open jail.local in your
18%
Project management with Phabricator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Joy Fera, fotolia.com
The open source world offers many project management tools. The classic bug trackers such as Mantis and Trac offer numerous additional features, as well, but they are often outdated. A modern
18%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
used in PowerSploit is slightly modified and only works in memory. Traces are not left behind on the hard disk. Conclusions PowerShell 5 opens up new attack vectors for breaking into corporate networks
18%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
mesh architecture showing in-band application traffic (blue) and out-of-band control traffic (green). Sidecar Service Mesh Implementations The most common open source sidecar-based service meshes
18%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
configuration. If you are aiming for more precise control of the synchronized attributes, check Azure AD app and attribute filtering . The wizard then opens two further steps for you, in which you can define your
18%
Successful protocol analysis in modern network structures
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © konstantynov, 123RF.com
on the network, even when virtualization is involved. A legacy protocol analysis tool (e.g., the open source utility Wireshark) is a standalone device or a piece of software on a PC that identifies problems

« Previous 1 ... 150 151 152 153 154 155 156 157 158 159 160 161 162 163 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice