Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 37 Next »

70%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
interfaces. Then try a hostname with an AAAA (IPv6) record, such as ipv6.google.com . If one of these pings doesn’t work, check the server setup, including the default gateway and firewall configuration
70%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
/_/cassandra Cassandra documentation: https://docs.datastax.com/en/cassandra/3.0/index.html
70%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
for disk diagnostics, delivering a full set of data and values related to hard and solid state drives (Figure 3). Besides the current S.M.A.R.T. status, the program displays the temperature, speed, write
70%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f3c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e6c4e1f
70%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
Timestamp: 2017-06-07T08:15:30Z labels: openai.org/location: azure-us-east-v2 name: 10.126.22.9 spec: externalID: 10.126.22.9 providerID: azure:////62823750-1942-A94F-822E-E6BF3C9EDCC4 status
70%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
is volatile storage that belongs to a specific VM and only exists as long as the VM exists, whereas volumes are persistent and can be connected to and disconnected from VMs at will. The normal case, as Amazon
70%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
"-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN" 04 "http://java.sun.com/dtd/web-app_2_3.dtd"> 05 06 07 08
70%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
at the data center [3]. To allow authorized users to work with the required programs and data, PCoIP can allow or prohibit looped USB devices explicitly. Workstation with Host Card With a host card, you can
70%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
address space, for example. In some ways, mmap() replaces normal file operations such as read(). As Figure 3 shows, its implementation in Linux differs in one important detail: For read() and the like
70%
Wireshark
27.11.2011
Home »  Articles  » 
 
. Normally, you don’t need to limit the packet size, so this option is not set by default. Because in this example, I want to analyze all data traffic, I will not apply a capture filter right now. You

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice