Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 208 Next »

12%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
by Raspberry Pi this spring [4] (Figure 2). The HAT+ standard format enables automatic detection of the board as well as the device connected through the single M Key edge interface it provides. M2 form factors
12%
Automate Active Directory management with the Python PyAD library
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Eric Issele, 123RF.com
is typically encrypted. If you do not want encryption, manually change the SSL value to False. Managing Users in AD The returned ADUser object provides insights into the settings applicable to the user account
12%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
, and customizations. sections is an array of sections, each of which in turn comprises an array of elements, called items. The developers provide a complete list of all available configuration options [2
12%
Finding the fastest SD cards for the Raspberry Pi
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Lucy Baldwin, 123RF.com
, the UHS-II, UHS-III, and SD Express standards have the ability to provide even faster speeds than UHS-I by using two lanes for data transfer on two rows of pins. Similarly, full-duplex and half
12%
Easy configuration management with Puppet
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Warangkana Bunyarittongchai, 123RF
provider to which you're able to pass boot-up-time commands, such as the user data on EC2. After a couple of hours getting your scripts together, you can bootstrap instances with a single script, apt
12%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
-reaching consequences. SQLmap [2] is an open source program that provides the perfect basis for comprehensive attacks on database systems. It is written in Python and is thus system-independent, and it is extensible
12%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
with the command: C:\WIN2GO> IMAGEX.EXE /APPLY INSTALL.WIM 1 E:\ This process can take a very long time. Mine took more than an hour to complete, so be patient and don't assume anything is wrong. ImageX provides
12%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
. The tlogRow component provides support and displays arbitrary intermediate results (Figure 6). Figure 6: The tlogRow component logs arbitrary intermediate
12%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
Interfaces button opens a dialog with the local interfaces that you can use for monitoring. The Input tab provides the network interfaces that Wireshark uses for sniffing. Equally important is Edit
12%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
restrictions on the user when working. At the same time, however, this provides better protection for the system. However, you do need to take this into account when recovering data and be careful when using

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice