Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1355)
  • Article (345)
  • News (204)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 183 184 185 186 187 188 189 190 191 Next »

13%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
monitoring products based on Nagios and that use either NSClient++ or their own agents, such as Checkmk [3], have this function, which makes it possible to inject arbitrary script code through the monitoring
13%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
it is talking to C:\Windows. Annoyingly, Windows allows users (and therefore also attackers) to create a new directory directly below C:, which must be prevented at the NTFS level [3]. In addition to path rules
13%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
in each node to create a distributed filesystem (e.g., a parallel virtual filesystem, PVFS [2], which is now known as OrangeFS [3]) that is part of the kernel. Applications could then use this shared space
13%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
container images, and podman pull nginx:alpine downloads the nginx:alpine image from one of the registered container repositories. A Podman Compose [3] solution also processes docker-compose.yml files
13%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
. The platform also comes with secure email communication that supports OAuth 2.0 for POP3 and IMAP email protocols to enable modern and secure authentication for the retrieval of email from services
13%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
lines from an Autoexpect-created script [3]. Autoexpect makes using Expect fun and more intuitive by letting you perform a procedure one time instead of many. After discovering and using Autoexpect, my
13%
Moving Your Data – It’s Not Always Pleasant
08.05.2013
Home »  HPC  »  Articles  » 
that these attributes are not yet implemented. However, dcp might be something to test to see if it meets your needs. You also might contribute something to the project, perhaps adding file attributes. 3. tar Another
13%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
refer to as the third layer, to really make your HPC cluster sing. Layer 3: Deep Administration The third level of tools gets you deeper into HPC administration and begins to gather more information
13%
Privacy Policy
24.05.2018
Home »  HPC  » 
 
advertising material, such as email spam, is received. 3. Data collection on our website Cookies Some of our web pages use cookies. Cookies do not harm your computer and do not contain any viruses
13%
Privacy Policy
24.05.2018
Home » 
 
if unsolicited advertising material, such as email spam, is received. 3. Data collection on our website Cookies Some of our web pages use cookies. Cookies do not harm your computer and do not contain any

« Previous 1 ... 183 184 185 186 187 188 189 190 191 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice