Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 153 154 155 156 157 158 159 160 161 162 163 164 165 166 ... 261 Next »

36%
Testing the Samsung MU-PA500B 500GB SSD
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Lucy Baldwin, 123RF.com
, I comprehensively kick the tires of a new storage device. In memory of Jerry Pournelle [1], Chaos Manor's unequalled author, I will try my best to have some fun while doing so. Parking Electrons
36%
Choosing between the leading open source configuration managers
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Giuseppe Ramos, 123RF.com and Paulus Rusyanto, Fotolia.com
witness to the disaster that awaits admins in a worst-case scenario. The update of OpenStack Havana to Icehouse, for example, introduced so many new features and incompatibilities that manifests
36%
News for Admins
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
 
(https://www.commerce.gov/news/press-releases/2022/09/nist-and-google-create-new-supply-chips-researchers-and-tech-startups) for production of open source chips. The chips will be manufactured by Sky
36%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
exist for a device and to add new keys, you call: cryptsetup luksDump cryptsetup luksAddKey Each key is stored in its own key-slot, or a total of eight areas. Users need
36%
Working with the Exchange Management Shell
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © silvae, 123RF.com
a new permission to a mailbox Get: shows the existing permissions. Remove: removes a rights entry. You will always find at least one "get" associated with a noun. It is therefore always
36%
Live snapshots with Virtual Machine Manager
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Iryna Denysova, 123RF.com
, and the original disk image is frozen, with any changes then written to a new image. However, to create external snapshots (live checkpointing), you will need to use Virsh [4]. The reason for talking about
36%
We interview Red Hat CEO Jim Whitehurst
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Jim Whitehurst
achieved in these 25 years. What has it contributed to our society that is beyond software and code? Jim Whitehurst: Linux has won. UNIX is slowly retreating, and Linux is driving new innovations, in areas
36%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Image courtesy Swapnil Bhartiya
-time free software advocate, Weaver felt frustration every time he went to the store to buy a new device. He was concerned with the way computers were becoming a threat to privacy, security, and freedom
36%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
directory. A new process then launches, and the existing process is migrated to this process. Then, the original process is terminated and the original unpacked files are deleted. Now the new process runs
36%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
Ensuring the security of a company's IT infrastructure becomes increasingly important as new threats and forms of attack continually emerge. Linux already has numerous tools for detecting anomalies

« Previous 1 ... 153 154 155 156 157 158 159 160 161 162 163 164 165 166 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice