Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 34 Next »

32%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
\RustDeskServer\bin. You need to open the file with the PUB extension and save the string it contains to configure your clients. The server version (v1.1.8 at the time of testing) added incoming rules to the Windows
32%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
the commands shown in Listing 1. Listing 1 Allowing Web Access $applicationPoolName = "" $authorizationFile = "C:\windows\web\powershellwebaccess\data\AuthorizationRules
32%
Multicloud management with Ansible
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Pawel Nolbert on Unsplash
as the appropriate subnets, security groups, and firewall rules. By the way, if you work with variable data in an Ansible playbook, you should always keep the data separate from the playbook logic (i.e., never hard
32%
Monitoring IPv6 with Wireshark
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Suzanne Tucker, 123RF.com
and is usually expressed as eights sets of four hexadecimal digits (known as nibbles, quibbles, or hextets) separated by colons. For example, an IPv6 address looks like this: 2001: 0db8: 1010: 61ab: f005: ba11: 00
32%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
. Although it allows for detailed analysis of the problems and performance, the evaluation process itself is anything but trivial. As a rule, you will need to define measuring points at important places
32%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
here, click on List zones (Figure 7) and then Edit an existing example.com zone, as in Figure 8. Figure 5: Poweradmin management web GUI
32%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
, because FreeBSD up to version 8 does not provide such a mechanism, the Capsicum environment was created in FreeBSD 9. In addition to a protected environment (sandbox), from which applications can't break
32%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
If you are like me, you remember the good old days of the Internet: the sweet sounds of a 28.8Kbps modem and the long, slow, and painful load time it took to display a single page. Never mind
32%
TinyDNS
02.03.2012
Home »  Articles  » 
 
as answering the questions above. For a number of reasons, I suspect, BIND continues to rule the waves for serving DNS on the Internet despite its background of problems. BIND’s multiple embarrassing security
32%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
/bin/gcc sh creategcctar.sh gentoo-java/gentoo-java.tar.gz: /usr/lib/jvm/icedtea-bin-8 createjavatar.sh sh createjavatar.sh gentoo-gmp/gentoo-gmp.tar.gz: /usr/lib64/pkgconfig/gmp.pc q files dev

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice