Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (164)
  • Article (1)
Keywords

« Previous 1 ... 10 11 12 13 14 15 16 17

23%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
that management also take part in the meetings. In a comic book style, "One Day in Kanban Land" [6] vividly illustrates how these stand-up meetings promote continual improvement and give all participants
23%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
again Prometheus proves to be the go-to tool when it comes to metrics data storage. Coroot stores logs, traces, and recognized profiles in ClickHouse [6]. ClickHouse is not a proprietary Coroot
23%
Apache 2.4 with mod_lua
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Tom Grundy, 123RF.com
the current archive [5] from the Apache website, and unpack it. Next, go to the Apache website [6] again, download the packages for APR and APR-util, unpack in the srclib/apr-util subfolder below the Apache
23%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
saved in /home/khess/.ssh/id_rsa.pub. 09 the key fingerprint is: 10 6d:2c:04:dd:bf:b2:de:e1:fc:52:e9:7f:59:10:98:bb khess@windows 11 The key's randomart image is: 12 +--[ RSA 2048]----+ 13 | .. . o
23%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
of the client request (both for POST and for GET), as well as the most important server environment details [6]. Additionally, you can use regular expressions. For example, to investigate an HTTP request to find

« Previous 1 ... 10 11 12 13 14 15 16 17

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice