Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (430)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 ... 229 Next »

12%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
Modern software such as large databases run on Linux machines that often provide hundreds of gigabytes of RAM. Systems that need to run the SAP database (HANA) in a production environment
12%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
HTTPD provides the Timeout directive to deal with user-induced denial-of-service problems like this and allows monitoring of the web server's I/O channels, such as the TCP connection to the browser
12%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
to the manufacturer, a grommunio instance can be integrated easily into an existing Windows Active Directory (AD) domain. Linux provides the operating system (openSUSE, Ubuntu, Red Hat, Raspberry Pi OS), which makes
12%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
a header with a source and target port to each IP packet. The header also contains the packet size in bytes and a checksum. UDP is fast, but it doesn't provide the kind of verification and connection
12%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
proxy, it protects web applications on other web servers, such as Tomcat or IIS. Breach also provides a collection of core rules that guarantees the basic security of the web server. Comprehensive
12%
Managing Linux systems with Spacewalk
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© patrimonio designs, Fotolia.com
or the 389 Directory Server. Spacewalk can clone existing channels and create new channels from scratch. This feature gives you full control of the software stack that you provide via Spacewalk. Configuration
12%
HPCCM with Docker and Podman
09.09.2024
Home »  HPC  »  Articles  » 
that the image is only 149MB, which is pretty small compared with the multigigbyte installations on desktops and laptops. To confirm that the container image works and that Vi is present, create an interactive
12%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
.net/~ubuntu-virt/virt-goodies/trunk/download/head:/vmware2libvirt $ python vmware2libvirt -f Metasploitable.vmx > Metasploitable.xml The Ubuntu script worked without any problems on a laptop running openSUSE Tumbleweed in our lab. The command zypper
12%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
Cloud computing provides computing resources and storage that can be accessed by any system connected to the Internet. Generally, this is in the form of virtual machines (VMs) and storage both
12%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
, this is the original and definitive source for all zone records for a domain. Secondary Name Server . Often called a slave server, this server is an identical replica used to provide redundancy and high availability

« Previous 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice