Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (44)
  • Article (5)
  • News (3)
Keywords

« Previous 1 2 3 4 5 6 Next »

27%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
at a predefined interval to give you an idea of the system status. For example, maybe you could gather the system load every 15 minutes with uptime  to get a very simplified view of the total system load. You could
27%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
value is 15 to 30 minutes for the cookie to expire after inactivity [1]. However, even for active use, OWASP recommends a defined time for the session to expire according to typical everyday use (i
27%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
occurred and to repair any damage that may have been caused. According to the website, Previct is easy to install, and most installations are completed in about 15 minutes. You can download a free trial
27%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
that allows access to an IRC server, even if the logged-in user is mapped to the SELinux xguest_u account. Listing 1 Log Error Message Aug 16 15:50:34 tscherf setroubleshoot: SELinux
27%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
in length and SHOULD require passwords to be a minimum of 15 characters in length. 2. SHOULD permit a maximum password length of at least 64 characters. 3. SHOULD accept all printing ASCII [RFC20 – https
27%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
/containers/freshrss/extensions:/var/www/FreshRSS/extensions:Z 10 Environment=TZ=Europe/Brussels 11 Environment=CRON_MIN=1,31 12 PublishPort=80:80 13 14 [Service] 15 Restart=always 16 17 [Install] 18 WantedBy=default.target If you are familiar with systemd
27%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
.168.2.14", "192.168.2.15"; 06 07 logging to_file => "rex.log"; 08 09 desc "Uptime estimate"; 10 task "uptime", group => ["intranet", "accounting"], sub { 11 say run 'uptime'; 12 }; Package Service Listing
27%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
contributorGalleryRole 11 ] 12 } 13 14 resource networkConnection 'Microsoft.DevCenter/networkConnections@2024-02-01' = { 15 name: networkConnectionName .. .. } 16 17 resource attachedNetworks 'Microsoft
27%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
considerations. For more information on acceptable algorithms, see NSA's Network Infrastructure Security Guide: https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR
27%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
a mouse. Fortunately, I have explored terminal user interface (TUI) tools often in this column. Tools like btop [12], glances [13], speedometer [14], nethogs [15], and even plain old top [16] are ready

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice