Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (270)
  • Article (6)
  • News (5)
Keywords

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 29 Next »

17%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
and may warrant further manual auditing. I know Coverity has been used on the Linux kernel before (prompting Linus Torvalds' often-mocked announcement with the release of the 2.6.11 kernel that "it's now
17%
Manage your servers with System Center Essentials
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kheng Ho Toh, 123RF.com
on the computer, and the computer's current load (Figure 6). Figure 6: SCE showing errors on servers in a centralized interface. Of course, you can use
17%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
the server certificate. 5. The client sends the encrypted SSL session key to the server. 6. The server decrypts the client's SSL session key using its own private key and encrypts the communications
17%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
. Robot Framework integrates the RobotMK extension [6] into the CheckMK monitoring system (Figure 5). CheckMK 2.3 is available in the form of the CheckMK Synthetic Monitoring [7] add-on. In all cases
17%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
it with the & character): for i in $(seq 1 6); do spark-submit --master k8s://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local
17%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD
17%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
computers running the Linux distributions CentOS 5 and 6, Debian 5 and 6, Fedora, Gentoo, Mageia, openSUSE, RHEL 5 and 6, Scientific Linux, and Ubuntu 10.04, 11.04, and 12.04. Additionally, it can handle
17%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
map for a setup consisting of six OSDs (i.e., individual storage devices in servers) distributed over three racks: crushtool --num_osds 6 -o crush.example.map --build host straw 1 rack straw 2 root
17%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
went to press. I installed Prelude on Debian Squeeze (6.0) and Ubuntu 11.10 for this article. Seeing Past False Positives SIEM systems are, without a doubt, an important component of any modern
17%
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 2011 PR NEWSWIRE
Enterprise Edition and a slew of warranty and support options. Red Hat 6.0 and SUSE Linux Enterprise Server 11.2 are also available for the TS430, as well as VMware ESX/ESXi. The servers are due at the end

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice