Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (311)
  • Article (9)
  • News (7)
Keywords

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 33 Next »

18%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
, Listing 3 shows the complete call to audit2allow with the policy module I manually modified for access to an IRC server. Listing 3 Policy Module # grep xchat /var/log/audit/audit.log | audit2
18%
GNU tools under Windows
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Markus Gann, 123RF.com
to the Windows desktop, but at a little less than 10MB, it is much more compact than Cygwin's 100MB and is also easier to install. Alternatives MobaXterm: A previous article [3] introduced Moba
18%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
Computing in cooperation with Sandia National Laboratories. According to the product announcement, the compact PowerInsight device is small enough to fit a 3.5-inch drive tray, and it can measure power
18%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
is important. Most existing tools (e.g., Darshan [1], Vampir [2], libiotrace [3]) are profilers that collect data during runtime and provide the collected data for later analysis. With the libiotrace
18%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
't envisage a centralized instance for mutual authentication. Although RFC 4474 [3] defines how to sign SIP messages to allow Alice to authenticate against Bob, there are no widespread implementations
18%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a 0.88x12.56x9.3-inch device weighing 2.99 pounds
18%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
continuously slows down after 3:00pm, suitable extrapolation methods can be used to determine when the shopping cart will no longer respond and allow developers and administrators to take action in good time
18%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
such as Amazon Simple Storage Service (S3), instead using the components already available in Kubeflow. Kubeflow Kubeflow is surfing the popular wave surrounding Linux containers (Figure 2). As the name suggests
18%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
solutions is that they can be used to mount a filesystem from a different operating system directly on a new system. For example, one of the more popular FUSE solutions is NTFS-3G, which lets you take an NTFS
18%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
-Anonymity ID Age Gender Zip Code Original Data 1 34 M 12345 2 36 F 12346 3 37 F 12347 4 35

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice