Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: ▶tippo365.com▶fortune gets how to win jon▶tippo365.com▶fortune gets how to win jackpotzi6 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 95 Next »

9%
RESTful APIs in practice
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Michal Bednarek, 123RF.com
is required with OAuth, a GET provides detailed information about the user on this URL with the appropriate Twitter alias (screen_name, here 23Cent): GET https://api.twitter.com/1.1/users/show.json ... Internet providers often market their open interfaces as RESTful, but is this true of the APIs, especially when no standard exists? We introduce some REST providers and look at how closely their API
9%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
the upgrade. Documentation on how to do that is available on the MySQL website. On dnf-based systems, instead of apt-get, you can use sudo systemctl stop mysql-server sudo dnf config-manager --disable mysql57 ... A number of breaking changes have been introduced between MySQL 5.7 and 8.0. We show you how to navigate this mandatory upgrade.
9%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
, this process does have a drawback: The session key is part of the communication. Anyone who records the encrypted communication and gets access to the private server key later can decrypt the key and then all ... and demonstrate how to protect your client and server.
9%
Discovering device names
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© cbpix, 123RF.com
to troubleshoot. I would like the name I see on the system to be identical to the chassis name so that I can see directly whether this is an onboard network port or a port on the external PCI card. You can get ... Ethernet devices in Linux have always been called eth0 and nothing else. All of a sudden, this universal truth has lost its validity, and Linux administrators need to understand why and how.
9%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
and secure web applications above and beyond Phpass [6]. Infos Phpass: http://www.openwall.com/phpass/ Information on the crypt function: http://no2.php ... How do web applications remember passwords? They don't. They turn them into mincemeat. And Phpass, which encrypts passwords in popular web applications, helps them do so.
9%
Setting up MariaDB replication with the help of XtraBackup
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Kran Kanthawong, 123RF.com
how many threads the backup uses at the same time. Listing 6 Starting a Backup innobackupex --user=backup --password= --throttle=60 --parallel=3 --safe-slave-backup "/mnt ... If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid
9%
IBM Open Technology Group
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
to what you are trying to do, you don't have to start from scratch. With code patterns you get something that you can build on it. ADMIN: How many code patterns do you have? NB: We have over 250 code ... Director of the IBM Open Technology group Nimesh Bhatia shares details about the company's involvement in open source and how its latest acquisition of Red Hat compliments its existing endeavors
9%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
an iSCSI session (Listing 6). Listing 6 Mismatching IQNs $ sudo /sbin/iscsiadm -m node -T iqn.2000-01.com.synology:MYDEVICE.Target-1.4d9e3bda2ee -p 192.168.1.10 -l iscsiadm: initiator ... The iSCSI protocol lets you access block storage across a network connection. We show you how to connect a Debian 12 system with a Synology storage device over iSCSI.
9%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
the Poweradmin application itself with: primary:~$cd /tmp primary:~$wget https://github.com/downloads/Poweradmin/Poweradmin/Poweradmin-2.1.6.tgz primary:~$tar xvfz Poweradmin-2.1.4.tgz primary:~$mv Poweradmin-2 ... PowerDNS is a secure, scalable, and reliable DNS server solution licensed under the GPL. We show you how to create a primary server with a MySQL back end managed by a Poweradmin web GUI.
9%
Exploring PowerDNS
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © ladyann, 123RF.com
primary or master server: sudo apt-get install pdns-server The example PowerDNS primary DNS server configuration in /etc/powerdns for example.com is shown in Listing 3. (For simplicity, the example omits ... PowerDNS is a secure, scalable, and reliable DNS server solution licensed under the GPL. We show you how to use BIND master zone configuration files to configure your PowerDNS server and how

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice