Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1267)
  • Article (320)
  • News (210)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 154 155 156 157 158 159 160 161 162 163 164 165 166 167 ... 181 Next »

9%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
the penetration testing tool with a reference to the network nodes on which the vulnerability exists. For the sample data populated for new users, the web server on 10.0.155.160 is affected. The tabs for CVSS
9%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
. Further details for each change follow this summary. If you automate the use of AIDE, you will definitely need to evaluate the program's return values. Like (virtually) any application, a return value of 0
9%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
they are allowed to make another login attempt. If this option is set to 0, login is simply impossible as long as the back-end server remains unavailable. A problem occurs with this approach if, say, the sudo rules
9%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
the SecDebugLogLevel parameter to specify verbosity, on a scale of 0 to 9, which issues comments on its own activities and the way it processes user-defined rules. Levels 4 or 5 are useful for fine tuning
9%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a 0.88x12.56x9.3-inch device weighing 2.99 pounds
9%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
classifies each pair into self-defined optimization categories. Category 0 means it cannot be optimized. Category 1 means it can easily be optimized. Category 2 means that although one or more other
9%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
://console.aws.amazon.com/cloudfront/home. Next, click on Create Distribution (Figure 2), and select Web | Continue . Under Origin Settings, enter the full address for your website (rather than my example site www.m0nk3y.biz ) and a descriptive
9%
MapReduce and Hadoop
27.02.2012
Home »  HPC  »  Articles  » 
(pseudocode): method Reduce(target,counts[c1,c2,...]) sum <- 0 for all c in counts[c1,c2,...] do sum <- sum + c end emit(target,sum) end If you take a look at the schematic, you quickly see
9%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
– in this example: virsh secret-set-value 2a5b08e4-3dca-4ff9-9a1d-40389758d081 AQA5jhZRwGPhBBAAa3t78yY/0+1QB5Z/9iFK2Q== Listing 4: ceph-secret.xml 01  02   2a5b08e4-3dca
9%
VMware Tools
15.10.2013
Home »  Articles  » 
be saved as a blueprint so that other users can produce additional instances of the application when needed. For the first time, the new version 5.0 of vFabric Director is no longer limited to Linux and now

« Previous 1 ... 154 155 156 157 158 159 160 161 162 163 164 165 166 167 ... 181 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice