Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 208 Next »

12%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
to serve secured content. Figure 3 shows as example test with Google's search engine as the endpoint, historically one of the Internet's snappiest endpoints. Results are provided for new sessions as well
12%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
: $ python3 -m numpy.f2py -c secret.pyf secret.f90 The output from the command (not shown) provides some good information about what it's doing and is useful in understanding what f2py does. f2py creates
12%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
to prune the logfile is the tail command. For instance, tail /var/log/auth.log will display the last 10 lines of the auth.log file. If that doesn't provide enough information to diagnose your problem, you
12%
Cron alternatives fcron and hcron
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © stillfx, 123RF.com
-value pairs in an event file. Moreover, hcron creates a template with all obligatory keys on request: You only have to enter the corresponding values. Additionally, hcron is easier to install and provides
12%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
). Windows translates kernel calls from the Pico process through Pico providers Lxss and LxCore into calls to the Windows kernel and forwards them transparently
12%
Regular expressions and metacharacters in PowerShell
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by JJ Ying on Unsplash.com
,4})), which then changed entries in text files as if by magic. Even though system administrators today do a large part of their work with graphical tools that provide a convenient interface, the use of regular
12%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
and is the final step of the analysis before Apache Spot displays the Storyboard. At this point, security analysts can perform a custom scan for a given threat. The Storyboard provides you with overviews of incident
12%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
these privileged accounts. Segmenting Active Directory is another way to minimize risk, and another important defense component is creating different passwords for local administrator accounts. Microsoft provides
12%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
documentation on GitHub [1] explains the currently available test set but only provided a brief reference when this issue went to press. For your first steps, Google offers the gcr
12%
Making Small Business Server 2011 fit for 2014
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © diego cervo, 123RF.com
of these tools provides a monitoring function in the right panel that shows you any problems with the server. Managing Updates Before installing larger service packs on the server, check the settings

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice